{
    "document": {
        "category": "csaf_security_advisory",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "nl",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            },
            {
                "category": "description",
                "text": "SAP heeft kwetsbaarheden verholpen in SAP S/4HANA, SAP Commerce Cloud, SAP Forecasting & Replenishment, SAP NetWeaver Application Server voor ABAP, SAP Business Server Pages, SAP BusinessObjects Business Intelligence Platform, SAP Strategic Enterprise Management Scorecard Wizard, SAPUI5 Search UI, SAP Financial Consolidation, SAP Incentive and Commission Management, SAP Application Server ABAP voor SAP NetWeaver en ABAP Platform, en SAP HANA Deployment Infrastructure.",
                "title": "Feiten"
            },
            {
                "category": "description",
                "text": "De kwetsbaarheden betreffen verschillende typen beveiligingsproblemen binnen de genoemde SAP-producten.\n\n- In SAP S/4HANA's Enterprise Search for ABAP module kunnen geauthenticeerde aanvallers SQL-injecties uitvoeren, wat kan leiden tot ongeautoriseerde toegang tot gevoelige data en applicatiecrashes.\n- SAP Commerce Cloud bevat een configuratiefout in Spring Security waardoor ongeauthenticeerde gebruikers kwaadaardige configuraties kunnen uploaden en daarmee willekeurige server-side code kunnen uitvoeren.\n- In SAP Forecasting & Replenishment en SAP NetWeaver Application Server voor ABAP kunnen geauthenticeerde gebruikers met administratieve rechten OS-commando's uitvoeren, wat kan resulteren in systeemcompromittering of verstoring van de applicatie.\n- SAP S/4HANA Condition Maintenance heeft een ontbrekende autorisatiecontrole waardoor geauthenticeerde gebruikers records kunnen bekijken en wijzigen zonder de juiste permissies.\n- SAP Business Server Pages Application component TAF_APPLAUNCHER en SAP NetWeaver Application Server ABAP bevatten Cross-Site Scripting (XSS) kwetsbaarheden die het mogelijk maken om gebruikers te misleiden via kwaadaardige links.\n- SAP BusinessObjects Business Intelligence Platform heeft een Cross Site Request Forgery (CSRF) kwetsbaarheid die geauthenticeerde gebruikers kan misleiden tot het uitvoeren van ongewenste acties.\n- SAP Strategic Enterprise Management Scorecard Wizard kent een autorisatiefout waardoor geauthenticeerde gebruikers toegang krijgen tot niet-toegestane informatie en instellingen kunnen wijzigen.\n- SAPUI5 Search UI is kwetsbaar voor URL-parameter manipulatie die kan leiden tot het injecteren van kwaadaardige content en gebruikers kan omleiden naar aanvallersites.\n- SAP Financial Consolidation bevat een kwetsbaarheid waarmee geauthenticeerde gebruikers sessies van andere gebruikers kunnen beëindigen, wat de beschikbaarheid beïnvloedt.\n- SAP Incentive and Commission Management heeft onvoldoende autorisatiecontrole waardoor geauthenticeerde gebruikers database tabellen kunnen aanpassen.\n- SAP Application Server ABAP voor SAP NetWeaver en ABAP Platform bevat een code-injectie kwetsbaarheid die geauthenticeerde gebruikers kunnen misbruiken om willekeurige code uit te voeren.\n- SAP HANA Deployment Infrastructure bevat een SQL-injectie kwetsbaarheid in de @sap/hdi-deploy package, waarbij gebruikers met hoge privileges dynamische SQL-query's kunnen manipuleren, wat de vertrouwelijkheid en beschikbaarheid kan beïnvloeden.\n\nDaarnaast is er een gerelateerde kwetsbaarheid in Apache Log4j Core (versies 2.0-beta9 tot 2.25.2) met ontbrekende TLS hostname verificatie, die man-in-the-middle aanvallen mogelijk maakt en ook diverse SAP-producten en andere software beïnvloedt.",
                "title": "Interpretaties"
            },
            {
                "category": "description",
                "text": "SAP heeft updates uitgebracht om de kwetsbaarheden in de genoemde producten te verhelpen. Daarnaast zijn er updates voor Apache Log4j beschikbaar (versies 2.18.0, 2.19.0 en 2.20.0) die de ontbrekende TLS hostname verificatie en andere problemen adresseren. Zie bijgevoegde referenties voor meer informatie.",
                "title": "Oplossingen"
            },
            {
                "category": "general",
                "text": "medium",
                "title": "Kans"
            },
            {
                "category": "general",
                "text": "high",
                "title": "Schade"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                "title": "CWE-89"
            },
            {
                "category": "general",
                "text": "Incomplete Cleanup",
                "title": "CWE-459"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                "title": "CWE-77"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                "title": "CWE-79"
            },
            {
                "category": "general",
                "text": "Improper Control of Generation of Code ('Code Injection')",
                "title": "CWE-94"
            },
            {
                "category": "general",
                "text": "Improper Certificate Validation",
                "title": "CWE-295"
            },
            {
                "category": "general",
                "text": "Improper Validation of Certificate with Host Mismatch",
                "title": "CWE-297"
            },
            {
                "category": "general",
                "text": "Cross-Site Request Forgery (CSRF)",
                "title": "CWE-352"
            },
            {
                "category": "general",
                "text": "Improper Resource Shutdown or Release",
                "title": "CWE-404"
            },
            {
                "category": "general",
                "text": "User Interface (UI) Misrepresentation of Critical Information",
                "title": "CWE-451"
            },
            {
                "category": "general",
                "text": "Missing Authorization",
                "title": "CWE-862"
            },
            {
                "category": "general",
                "text": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities",
                "title": "CWE-937"
            },
            {
                "category": "general",
                "text": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities",
                "title": "CWE-1035"
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "Nationaal Cyber Security Centrum",
            "namespace": "https://www.ncsc.nl/"
        },
        "references": [
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/may-2026.html"
            }
        ],
        "title": "Kwetsbaarheden verholpen in diverse SAP-producten",
        "tracking": {
            "current_release_date": "2026-05-12T12:21:42.857141Z",
            "generator": {
                "date": "2025-08-04T16:30:00Z",
                "engine": {
                    "name": "V.A.",
                    "version": "1.3"
                }
            },
            "id": "NCSC-2026-0140",
            "initial_release_date": "2026-05-12T12:21:42.857141Z",
            "revision_history": [
                {
                    "date": "2026-05-12T12:21:42.857141Z",
                    "number": "1.0.0",
                    "summary": "Initiele versie"
                }
            ],
            "status": "final",
            "version": "1.0.0"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-1"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Application Server ABAP for NetWeaver and ABAP Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-2"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Business Server Pages Application"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-3"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "BusinessObjects Business Intelligence Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-4"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Commerce Cloud Configuration"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-5"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Financial Consolidation"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-6"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Forecasting & Replenishment"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-7"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "HANA Deployment Infrastructure deploy library"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-8"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Incentive and Commission Management"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-9"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "NetWeaver Application Server ABAP"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-10"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "NetWeaver Application Server for ABAP and ABAP Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-11"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "S4HANA"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-12"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "S4HANA Condition Maintenance"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-13"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SAP BusinessObjects Business Intelligence Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-14"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SAP Financial Consolidation"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-15"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SAP NetWeaver Application Server for ABAP and ABAP Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-16"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SAP Software"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-17"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Strategic Enterprise Management"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-18"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "UI5"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-19"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "netweaver_application_server_abap"
                    }
                ],
                "category": "vendor",
                "name": "SAP"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-34260",
            "cwe": {
                "id": "CWE-89",
                "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                    "title": "CWE-89"
                },
                {
                    "category": "description",
                    "text": "SAP S/4HANA's SAP Enterprise Search for ABAP contains a SQL injection vulnerability that allows authenticated attackers to execute malicious SQL, risking unauthorized data access and application crashes.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-34260 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34260.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
                        "baseScore": 9.6,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-34260"
        },
        {
            "cve": "CVE-2026-34263",
            "cwe": {
                "id": "CWE-459",
                "name": "Incomplete Cleanup"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incomplete Cleanup",
                    "title": "CWE-459"
                },
                {
                    "category": "description",
                    "text": "SAP Commerce Cloud suffers from a missing authentication check due to improper Spring Security configuration, enabling unauthenticated users to upload malicious configurations and execute arbitrary server-side code, impacting confidentiality, integrity, and availability.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-34263 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34263.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
                        "baseScore": 9.6,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-34263"
        },
        {
            "cve": "CVE-2026-34259",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "description",
                    "text": "An OS Command Execution vulnerability in SAP Forecasting & Replenishment allows authenticated administrators to execute arbitrary system commands, risking full system compromise including data breach, modification, or shutdown.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-34259 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34259.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                        "baseScore": 8.2,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-34259"
        },
        {
            "cve": "CVE-2026-40135",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "description",
                    "text": "An OS Command Injection vulnerability in SAP NetWeaver Application Server for ABAP enables an authenticated administrator to execute hidden operating system commands, compromising application integrity and availability without impacting confidentiality.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40135 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40135.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40135"
        },
        {
            "cve": "CVE-2026-40133",
            "cwe": {
                "id": "CWE-862",
                "name": "Missing Authorization"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Missing Authorization",
                    "title": "CWE-862"
                },
                {
                    "category": "description",
                    "text": "A missing authorization check in SAP S/4HANA Condition Maintenance permits authenticated attackers to view and modify condition table records without permission, affecting data confidentiality, integrity, and availability at a low severity level.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40133 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40133.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
                        "baseScore": 6.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40133"
        },
        {
            "cve": "CVE-2026-40137",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "A Cross-Site Scripting (XSS) vulnerability in the SAP Business Server Pages Application (TAF_APPLAUNCHER) allows unauthenticated attackers to craft malicious links that redirect users to attacker-controlled sites, impacting confidentiality and integrity.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40137 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40137.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40137"
        },
        {
            "cve": "CVE-2026-0502",
            "cwe": {
                "id": "CWE-352",
                "name": "Cross-Site Request Forgery (CSRF)"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Cross-Site Request Forgery (CSRF)",
                    "title": "CWE-352"
                },
                {
                    "category": "description",
                    "text": "A Cross Site Request Forgery (CSRF) vulnerability in SAP BusinessObjects Business Intelligence Platform allows an authenticated user to be tricked into sending unintended requests, affecting system integrity and availability without compromising data confidentiality.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-0502 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-0502.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                        "baseScore": 5.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-0502"
        },
        {
            "cve": "CVE-2026-40132",
            "cwe": {
                "id": "CWE-862",
                "name": "Missing Authorization"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Missing Authorization",
                    "title": "CWE-862"
                },
                {
                    "category": "description",
                    "text": "An authorization flaw in SAP Strategic Enterprise Management's Scorecard Wizard permits authenticated users to access unauthorized data and modify settings, affecting risk evaluations with limited impact on confidentiality and integrity.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40132 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40132.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
                        "baseScore": 5.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40132"
        },
        {
            "cve": "CVE-2025-68161",
            "cwe": {
                "id": "CWE-297",
                "name": "Improper Validation of Certificate with Host Mismatch"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Certificate with Host Mismatch",
                    "title": "CWE-297"
                },
                {
                    "category": "other",
                    "text": "Improper Certificate Validation",
                    "title": "CWE-295"
                },
                {
                    "category": "description",
                    "text": "Multiple Apache Log4j Core versions up to 2.25.2 have a vulnerability in the Socket Appender due to missing TLS hostname verification, enabling man-in-the-middle attacks, affecting products from Oracle, IBM, NetApp, and SAP.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-68161 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-68161.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
                        "baseScore": 5.4,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2025-68161"
        },
        {
            "cve": "CVE-2026-34258",
            "cwe": {
                "id": "CWE-451",
                "name": "User Interface (UI) Misrepresentation of Critical Information"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "User Interface (UI) Misrepresentation of Critical Information",
                    "title": "CWE-451"
                },
                {
                    "category": "description",
                    "text": "SAPUI5's Search UI contains a vulnerability allowing unauthenticated attackers to manipulate URL parameters for malicious content injection, potentially redirecting users to attacker-controlled sites, with limited confidentiality impact and no integrity or availability effects.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-34258 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34258.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
                        "baseScore": 4.7,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-34258"
        },
        {
            "cve": "CVE-2026-27682",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "A reflected Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server ABAP affects Business Server Pages, allowing unauthenticated attackers to execute malicious scripts via crafted URLs, compromising application confidentiality and integrity.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-27682 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-27682.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 4.7,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-27682"
        },
        {
            "cve": "CVE-2026-40136",
            "cwe": {
                "id": "CWE-404",
                "name": "Improper Resource Shutdown or Release"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Resource Shutdown or Release",
                    "title": "CWE-404"
                },
                {
                    "category": "description",
                    "text": "SAP Financial Consolidation contains a vulnerability that permits an authenticated attacker to disrupt availability by terminating other users' sessions without impacting data confidentiality or integrity.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40136 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40136.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
                        "baseScore": 4.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40136"
        },
        {
            "cve": "CVE-2026-40134",
            "cwe": {
                "id": "CWE-862",
                "name": "Missing Authorization"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Missing Authorization",
                    "title": "CWE-862"
                },
                {
                    "category": "description",
                    "text": "The SAP Incentive and Commission Management application contains a vulnerability due to insufficient authorization checks, enabling authenticated users to remotely update tables, resulting in a low integrity risk without impacting confidentiality or availability.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40134 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40134.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
                        "baseScore": 4.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40134"
        },
        {
            "cve": "CVE-2026-40129",
            "cwe": {
                "id": "CWE-94",
                "name": "Improper Control of Generation of Code ('Code Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Control of Generation of Code ('Code Injection')",
                    "title": "CWE-94"
                },
                {
                    "category": "description",
                    "text": "A Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform allows authenticated attackers to execute arbitrary code via crafted inputs, affecting system integrity without impacting confidentiality or availability.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40129 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40129.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
                        "baseScore": 4.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40129"
        },
        {
            "cve": "CVE-2026-40131",
            "cwe": {
                "id": "CWE-89",
                "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                    "title": "CWE-89"
                },
                {
                    "category": "description",
                    "text": "A SQL Injection vulnerability in SAP HANA Deployment Infrastructure's @sap/hdi-deploy package allows high privileged users to manipulate SELECT statements via dynamic SQL without proper parameterization, impacting confidentiality and availability.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-40131 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40131.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
                        "baseScore": 3.4,
                        "baseSeverity": "LOW"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19"
                    ]
                }
            ],
            "title": "CVE-2026-40131"
        }
    ]
}