Due to insufficient input handling, the SAP Identity Management REST interface allows an authenticated administrator to submit specially crafted malicious REST requests that are processed by JNDI operations without adequate input neutralization. This may lead to limited disclosure or modification of data, resulting in low impact on confidentiality and integrity, with no impact on application availability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to insufficient input handling, the SAP Identity Management REST interface allows an authenticated administrator to submit specially crafted malicious REST requests that are processed by JNDI operations without adequate input neutralization. This may lead to limited disclosure or modification of data, resulting in low impact on confidentiality and integrity, with no impact on application availability.
Title Insufficient Input Handling in JNDI Operations of SAP Identity Management
Weaknesses CWE-943
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-01-13T01:14:27.040Z

Reserved: 2025-12-09T22:06:44.481Z

Link: CVE-2026-0504

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-13T02:15:53.110

Modified: 2026-01-13T02:15:53.110

Link: CVE-2026-0504

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses