SAP released 17 new Security Notes as part of its January 2026 Security Patch Day (plus 2 updates), addressing 19 vulnerabilities including four critical-severity flaws. The most severe—CVE-2026-0501—is a SQL injection in S/4HANA’s General Ledger module with a CVSS score of 9.9.

Patch overview

MetricCount
New Security Notes17
Updated Security Notes2
Total vulnerabilities19
HotNews (Critical) Notes6
High Priority Notes4

Critical vulnerabilities

CVECVSSProductTypeSAP Note
CVE-2026-05019.9S/4HANA (General Ledger)SQL Injection3687749
CVE-2026-05009.6Wily Introscope Enterprise ManagerRemote Code Execution
CVE-2026-04989.1S/4HANACode Injection → OS Command Injection3694242
CVE-2026-04919.1Landscape TransformationCode Injection3697979
CVE-2026-04928.8SAP HANA DatabasePrivilege Escalation

CVE-2026-0501: SQL injection in S/4HANA

Severity: CVSS 9.9 (Critical) SAP Note: 3687749

Technical details

The vulnerability exists in SAP S/4HANA’s Financials General Ledger component:

AttributeDetails
ComponentFinancials – General Ledger
InterfaceRemote Function Call (RFC)-enabled module
FrameworkABAP Database Connectivity (ADBC)
Root causeInadequate input validation on SQL parameters
Attack typeArbitrary SQL command execution

Vulnerability mechanism

StepAction
1Attacker identifies RFC-enabled function module
2Crafted SQL statement passed via input parameter
3ADBC framework executes native SQL without validation
4Arbitrary SQL commands execute against database
5Full system compromise achieved

“This SQL statement is provided through an input parameter and allows an attacker to execute arbitrary SQL commands. On successful exploitation, the system can be fully compromised.”

Affected versions

ProductAffected VersionsEnvironment
S4CORE102 through 109Private Cloud
S4CORE102 through 109On-Premise

Exploitation requirements

RequirementDetails
AuthenticationRequired (low-privilege sufficient)
Network accessRFC-enabled module reachable
User interactionNone required
PrivilegesLow (S_RFC authorization)

Critical prerequisite

SAP notes a critical configuration factor: the vulnerability becomes exploitable when S_RFC authorizations are configured too broadly, allowing external RFC calls to the affected function group.

Attack scenario

PhaseAction
1Attacker compromises technical RFC user
2Uses RFC tooling to call vulnerable function
3Passes crafted SQL parameters
4Arbitrary SQL executes on database
5Data theft, modification, or destruction

Why ERP SQL injection is critical

SQL injection in enterprise ERP systems has severe business impact:

Risk AreaExposure
Financial dataTransaction records, pricing, AP/AR, general ledger
Supply chainInventory, procurement, logistics
HR dataEmployee records, payroll, benefits
Customer dataMaster data, orders, contracts
RegulatorySOX, GDPR, industry-specific compliance

General Ledger significance

The General Ledger module is the foundation of financial record-keeping in S/4HANA:

FunctionRisk if compromised
Financial statementsFraudulent reporting
Audit trailEvidence tampering
Compliance recordsRegulatory violations
Tax recordsTax fraud liability
Intercompany transactionsHidden transfers

S/4HANA is SAP’s flagship ERP platform used by thousands of enterprises for core business processes. Compromise of the General Ledger module represents existential business risk.

Other critical patches

CVE-2026-0500: Wily Introscope RCE (CVSS 9.6)

AttributeDetails
ProductWily Introscope Enterprise Manager
TypeRemote Code Execution
AuthenticationNot required
ImpactFull monitoring infrastructure compromise

Remote code execution in SAP’s application performance monitoring tool. Allows unauthenticated attackers to execute commands on the monitoring infrastructure.

CVE-2026-0498: S/4HANA Code Injection (CVSS 9.1)

AttributeDetails
ProductS/4HANA
TypeCode Injection → OS Command Injection
SAP Note3694242
ImpactSystem command execution

RFC-based code injection leading to OS command injection. Enables attackers to execute system commands on the application server.

CVE-2026-0491: Landscape Transformation Code Injection (CVSS 9.1)

AttributeDetails
ProductLandscape Transformation
TypeCode Injection
SAP Note3697979
ImpactMigration tooling compromise

Code injection vulnerability in SAP’s system migration and transformation tooling.

CVE-2026-0492: HANA Privilege Escalation (CVSS 8.8)

AttributeDetails
ProductSAP HANA Database
TypePrivilege Escalation
ImpactDatabase integrity compromise

Enables authenticated users to escalate privileges and compromise database integrity.

Patching guidance

Priority order

PrioritySAP NoteCVEProduct
1 (Emergency)3687749CVE-2026-0501S/4HANA Finance SQL injection
2CVE-2026-0500Wily Introscope RCE
33694242CVE-2026-0498S/4HANA RFC code injection
43697979CVE-2026-0491Landscape Transformation
5CVE-2026-0492HANA privilege escalation

Implementation steps

StepAction
1Download Security Notes from SAP Support Portal
2Test patches in sandbox/QA environment
3Review database logs for exploitation indicators
4Deploy to production during maintenance window
5Verify installation via SAP Note validation
6Review S_RFC authorizations for overly broad access

If patching must be delayed

MitigationPurpose
WAF rulesBlock suspicious SQL patterns
Network restrictionsLimit RFC module access
Enhanced loggingDetect exploitation attempts
S_RFC auditRestrict external RFC permissions
SQL monitoringAlert on anomalous queries

Detection indicators

IndicatorMeaning
Unusual SQL patterns in GL modulePotential exploitation
RFC calls from unexpected sourcesUnauthorized access
Failed authentication spikesAttack reconnaissance
Large data exports from financeData exfiltration
Anomalous GL transaction patternsPost-exploitation activity

Recommendations

For SAP administrators

PriorityAction
CriticalApply SAP Note 3687749 immediately (emergency patch)
CriticalReview and restrict S_RFC authorizations
HighPatch all critical-severity notes within 72 hours
HighAudit RFC-enabled function modules
MediumImplement WAF rules as interim mitigation
OngoingMonitor for exploitation indicators

For security teams

PriorityAction
CriticalValidate patch deployment across SAP landscape
HighReview database logs for prior exploitation
HighAssess S_RFC authorization scope
MediumUpdate detection rules for SQL injection patterns
OngoingInclude SAP in vulnerability management program

Ongoing SAP security

PracticeBenefit
Subscribe to Security Notes notificationsEarly awareness
Monthly patch review cyclesAligned with Patch Day
Current Support Pack levelsReduced technical debt
SAP security baselineConfiguration hardening
SAP Enterprise Threat DetectionContinuous monitoring

Context

SAP Security Patch Day occurs on the second Tuesday of each month. January 2026’s release is notable for the concentration of critical-severity vulnerabilities affecting core ERP functionality.

The new SAP Security year starts with six HotNews Notes—an unusually high number of critical issues for a single Patch Day. Organizations running S/4HANA should treat CVE-2026-0501 as an emergency patch—SQL injection with CVSS 9.9 in the General Ledger module represents maximum business risk.

The combination of financial system access, arbitrary SQL execution, and low privilege requirements makes this one of the most severe SAP vulnerabilities in recent memory.