An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, high-privilege actions. This has a high impact on data integrity, with low impact on confidentiality and no impact on availability of the application.
History

Tue, 17 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap sap Basis
CPEs cpe:2.3:a:sap:sap_basis:752:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:753:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:754:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:755:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:756:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:757:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:758:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_basis:816:*:*:*:*:*:*:*
Vendors & Products Sap sap Basis

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap business Workflow
Vendors & Products Sap
Sap business Workflow

Tue, 10 Feb 2026 03:45:00 +0000

Type Values Removed Values Added
Description An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, high-privilege actions. This has a high impact on data integrity, with low impact on confidentiality and no impact on availability of the application.
Title Missing authorization check in SAP Business Workflow
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2026-02-10T03:03:19.917Z

Updated: 2026-02-10T17:17:48.810Z

Reserved: 2026-01-21T22:15:25.361Z

Link: CVE-2026-24312

cve-icon Vulnrichment

Updated: 2026-02-10T17:17:43.512Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T04:16:03.663

Modified: 2026-02-17T15:32:58.490

Link: CVE-2026-24312

cve-icon Redhat

No data.