← back

CVE-2026-34260

CRITICAL · 9.6 EPSS 0.0%
hype MIXED · 58 hack

Published today, no KEV or PoC yet; vendor/defender chatter and urgency signals real threat, but early-stage triage lacks exploitation confirmation.

What: SQL injection in SAP S/4HANA Enterprise Search for ABAP (CVSS 9.6 CRITICAL) allowing authenticated attackers to inject malicious SQL and exfiltrate database contents or crash the application.

Why it matters: Published today with CVSS 9.6 and high impact to confidentiality/availability. Not yet KEV-listed and no public PoC confirmed in chatter, but social posts emphasize immediate patching and note no patch currently available. Affects SAP_BASIS 751-816. Initial triage posts from security vendors and practitioners suggest rapid awareness.

Where it's seen: Bulk CVE list posts, vendor advisories (Patchstack, OffSeq, OrizonCyber), and practitioner alerts on Bluesky and X urging immediate access restriction and monitoring for suspicious SQL activity pending patch availability.

RISK: CRITICAL — CVSS 9.6, authenticated SQL injection in widely-deployed ERP affecting confidentiality and availability.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/12/2026, 2:34:41 PM

Description

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user input into SQL queries, which are then passed to the underlying database without proper validation or sanitization. Upon successful exploitation, an attacker may gain unauthorized access to sensitive database information and could potentially crash the application. This vulnerability has a high impact on the confidentiality and availability of the application, while integrity remains unaffected.

CVSS 3.1 breakdown

Exploitability 3.1 · Impact 5.8
vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
Attack vector
Network
Complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
High

Weaknesses