Authentication Vulnerability in SAP NetWeaver Application Server ABAP
CVE-2026-23687
Key Information:
- Vendor
SAP
- Vendor
- CVE Published:
- 10 February 2026
What is CVE-2026-23687?
CVE-2026-23687 is an authentication vulnerability found in the SAP NetWeaver Application Server ABAP, a platform widely utilized for building enterprise applications using the ABAP programming language. This vulnerability allows an authenticated attacker, who has normal privileges, to manipulate signed XML documents and convince the system to accept tampered identity information. Such manipulation can lead to unauthorized access to sensitive user data, as the system may inadvertently trust the modified documents. This flaw could severely disrupt normal operations within an organization, as attackers could gain access to critical functionality or sensitive information, undermining the overall integrity and confidentiality of the system.
Potential impact of CVE-2026-23687
-
Unauthorized Access to Sensitive Data: The ability to submit tampered identity information means an attacker could gain access to confidential user data, potentially leading to data breaches and privacy violations.
-
Disruption of System Operations: By allowing modified signed XML documents, the vulnerability can disrupt normal system functions, hindering business processes and potentially causing downtime.
-
Increased Risk of Exploitation: Although currently not exploited in the wild, the nature of this vulnerability may attract malicious actors, increasing the threat landscape for affected organizations and potentially leading to exploitation in the future.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
SAP NetWeaver AS ABAP and ABAP Platform SAP_BASIS 700
SAP NetWeaver AS ABAP and ABAP Platform SAP_BASIS 701
SAP NetWeaver AS ABAP and ABAP Platform SAP_BASIS 702
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved