PROBABLYPWNED
VulnerabilitiesApril 19, 20263 min read

SAP Patches 9.9-Severity SQL Injection in BPC and Business Warehouse

CVE-2026-27681 allows low-privileged users to execute arbitrary SQL commands in SAP Business Planning and Consolidation. CVSS 9.9 - patch immediately.

Marcus Chen

SAP released 20 security notes as part of its April 2026 Security Patch Day, with the most critical being CVE-2026-27681 — a SQL injection vulnerability carrying a near-maximum CVSS score of 9.9.

The flaw affects SAP Business Planning and Consolidation (BPC) and SAP Business Warehouse (BW), two widely deployed enterprise resource planning components used by organizations worldwide for financial consolidation, budgeting, and data warehousing.

What Makes This Vulnerability Critical

The vulnerability stems from insufficient authorization checks in BPC and BW. An authenticated user with low privileges can upload a file containing arbitrary SQL statements that the system then executes without proper validation.

Successful exploitation gives attackers the ability to:

  • Read, modify, or delete sensitive database records
  • Execute arbitrary database commands
  • Potentially pivot to other connected systems
  • Cause denial of service through data manipulation

Unlike many SQL injection flaws that require specific conditions, CVE-2026-27681 is straightforward to exploit once an attacker has basic authenticated access. The attack complexity is rated Low, and no user interaction is required beyond the initial authentication.

Affected SAP Products and Versions

The vulnerability impacts multiple versions across the BPC and BW product lines:

SAP Business Planning and Consolidation:

  • HANABPC 810
  • BPC4HANA 300
  • BPC 10.1 and 11.0 (Microsoft SQL Server backends)

SAP Business Warehouse:

  • SAP_BW versions 750, 752, 753, 754, 755, 756, 757, 758, and 816

Organizations running any of these versions should treat patching as an immediate priority. The vulnerability's 9.9 CVSS score reflects both the ease of exploitation and the potential for complete database compromise.

No Known Exploitation — Yet

SAP stated that none of the vulnerabilities addressed in this patch cycle are currently being exploited in the wild. But given the severity and the relatively low barrier to exploitation, that window is unlikely to remain open for long.

Critical SAP vulnerabilities have historically attracted rapid weaponization. When attackers can execute arbitrary SQL with a low-privileged account, credential theft or insider threats become especially dangerous vectors.

Other Notable Fixes in April's Patch Day

Beyond CVE-2026-27681, SAP addressed several other high-severity issues. This month's patch batch continues a pattern we've seen across major vendors in April's Patch Tuesday cycle, where critical flaws are clustering around authentication bypass and code execution.

Organizations managing hybrid SAP landscapes should also review patches for:

  • Cross-site scripting in SAP NetWeaver components
  • Authorization bypass in ABAP kernel modules
  • Memory corruption in SAP GUI clients

Why This Matters

SAP systems are backbone infrastructure for many enterprises. They handle financials, HR data, supply chain logistics, and business intelligence. A SQL injection at this level isn't just a technical vulnerability — it's an existential risk to data integrity.

The timing is also worth noting. With NIST NVD shifting its CVE enrichment priorities, organizations relying on external vulnerability databases for patch prioritization need to be especially proactive with vendor-specific advisories. SAP's own security notes should be the authoritative source.

For security teams managing SAP environments, CVE-2026-27681 represents exactly the kind of vulnerability that ransomware operators and data extortion groups look for — high-value systems, database access, and enterprise-wide impact.

Immediate Actions

  1. Apply SAP Security Note 3719353 addressing CVE-2026-27681
  2. Audit user privileges in BPC and BW environments — minimize accounts with upload capabilities
  3. Monitor database activity for unusual SQL patterns or bulk data access
  4. Review authentication logs for compromised or anomalous accounts

SAP customers can access the full security patch details through the SAP Support Portal. Given the severity, delaying this patch isn't worth the risk.

Related Articles