SAP Customer Relationship Management
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in SAP Customer Relationship Management.
By the Year
In 2026 there have been 0 vulnerabilities in SAP Customer Relationship Management. Customer Relationship Management did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 6.30 |
| 2022 | 0 | 0.00 |
| 2021 | 1 | 7.20 |
| 2020 | 0 | 0.00 |
| 2019 | 0 | 0.00 |
| 2018 | 1 | 6.60 |
It may take a day or so for new Customer Relationship Management vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent SAP Customer Relationship Management Security Vulnerabilities
SAP CRM Auth Escalation via Vulnerable Interface (CVE-2023-27897)
CVE-2023-27897
6.3 - Medium
- April 11, 2023
In SAP CRM - versions 700, 701, 702, 712, 713, an attacker who is authenticated with a non-administrative role and a common remote execution authorization can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can can have limited impact on confidentiality and integrity of non-critical user or application data and application availability.
Code Injection
A missing authority check in SAP CRM
CVE-2021-33676
7.2 - High
- July 14, 2021
A missing authority check in SAP CRM, versions - 700, 701, 702, 712, 713, 714, could be leveraged by an attacker with high privileges to compromise confidentiality, integrity, or availability of the system.
AuthZ
SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54
CVE-2018-2380
6.6 - Medium
- March 01, 2018
SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs.
Directory traversal
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for SAP Customer Relationship Management or by SAP? Click the Watch button to subscribe.