SAP NetWeaver Command Injection (January 2026)

high Nessus Plugin ID 288282

Synopsis

The remote SAP NetWeaver application server is affected by a Command Injection vulnerability.

Description

The version of SAP NetWeaver Application Server for Java detected on the remote host is affected by an SAP NetWeaver is affected by a server-side request forgery (SSRF) vulnerabilityas disclosed in the SAP Security Patch Day January 2026:

- Due to an OS Command Injection vulnerability in SAP Application Server for ABAP and SAP NetWeaver RFCSDK, an authenticated attacker with administrative access and adjacent network access could upload specially crafted content to the server. If processed by the application, this content enables execution of arbitrary operating system commands. Successful exploitation could lead to full compromise of the system’s confidentiality, integrity, and availability. (CVE-2026-0507)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the appropriate patch according to the vendor advisory.

See Also

http://www.nessus.org/u?02c0a10f

https://me.sap.com/notes/3675151

Plugin Details

Severity: High

ID: 288282

File Name: sap_netweaver_kernel_jan_2026.nasl

Version: 1.1

Type: remote

Family: Web Servers

Published: 1/16/2026

Updated: 1/16/2026

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: High

Base Score: 7.7

Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-0507

CVSS v3

Risk Factor: High

Base Score: 8.4

Vector: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:sap:netweaver_application_server

Required KB Items: installed_sw/SAP Netweaver Application Server (AS), Settings/ParanoidReport

Patch Publication Date: 1/13/2026

Vulnerability Publication Date: 1/13/2026

Reference Information

CVE: CVE-2026-0507

IAVB: 2026-A-0031