CVE-2026-27678
Authorization Bypass in SAP S/4HANA OData Service Enables Data Tampering
Publication date: 2026-04-14
Last updated on: 2026-04-14
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | s_4hana | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists due to missing authorization checks in the SAP S/4HANA backend OData Service called Manage Reference Structures. Because of this, an attacker with some level of privileges could update and delete child entities through exposed OData services without proper authorization.
The vulnerability primarily impacts data integrity, meaning unauthorized changes can be made to data. However, confidentiality and availability are not affected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability impacts the integrity of data by allowing unauthorized updates and deletions of child entities via exposed OData services in SAP S/4HANA. While confidentiality and availability are not affected, the integrity impact could lead to non-compliance with standards and regulations that require strict data integrity controls, such as GDPR and HIPAA.
Specifically, regulations like GDPR and HIPAA mandate that organizations ensure the accuracy and integrity of personal and sensitive data. Unauthorized modification or deletion of data could violate these requirements, potentially resulting in compliance issues.
How can this vulnerability impact me? :
The main impact of this vulnerability is on the integrity of your data. An attacker could modify or delete child entities in the SAP S/4HANA system without proper authorization, potentially leading to corrupted or lost data.
Since confidentiality and availability are not impacted, the risk does not include unauthorized data disclosure or denial of service, but the unauthorized data modification could disrupt business processes or cause incorrect data to be used.