SAP Enable Now
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in SAP Enable Now.
By the Year
In 2026 there have been 0 vulnerabilities in SAP Enable Now. Enable Now did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 4.60 |
| 2023 | 3 | 5.83 |
| 2022 | 2 | 7.25 |
| 2021 | 1 | 4.60 |
| 2020 | 2 | 0.00 |
| 2019 | 6 | 7.58 |
It may take a day or so for new Enable Now vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent SAP Enable Now Security Vulnerabilities
SAP Enable Now: Arbitrary File Upload via Missing Content-Type Verification
CVE-2024-34692
4.6 - Medium
- July 09, 2024
Due to missing verification of file type or content, SAP Enable Now allows an authenticated attacker to upload arbitrary files. These files include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker can cause limited impact on confidentiality and Integrity of the application.
Unrestricted File Upload
SAP Enable Now Referrer-Policy missing in v1.0/10 enables referrer disclosure
CVE-2023-36919
5.3 - Medium
- July 11, 2023
In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure.
Exposure of Sensitive Information Due to Incompatible Policies
Missing X-Content-Type-Options Enables XSS in SAP Enable Now WPB_MANAGER 1.0
CVE-2023-36918
6.1 - Medium
- July 11, 2023
In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the X-Content-Type-Options response header is not implemented, allowing an unauthenticated attacker to trigger MIME type sniffing, which leads to Cross-Site Scripting, which could result in disclosure or modification of information.
XSS
SAP Enable Now XSS: missing CSP/X-XSS-Protection (WPB 1.0/10, ENABLE 1704)
CVE-2023-33988
6.1 - Medium
- July 11, 2023
In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Content-Security-Policy and X-XSS-Protection response headers are not implemented, allowing an unauthenticated attacker to attempt reflected cross-site scripting, which could result in disclosure or modification of information.
XSS
SAP Enable Now Stored XSS via Network-Encoded Inputs Expands Attack Scope
CVE-2022-35297
5.4 - Medium
- October 11, 2022
The application SAP Enable Now does not sufficiently encode user-controlled inputs over the network before it is placed in the output being served to other users, thereby expanding the attack scope, resulting in Stored Cross-Site Scripting (XSS) vulnerability leading to limited impact on Confidentiality, Integrity and Availability.
XSS
SAP EN insecure session management allows unauthenticated access
CVE-2022-35293
9.1 - Critical
- August 10, 2022
Due to insecure session management, SAP Enable Now allows an unauthenticated attacker to gain access to user's account. On successful exploitation, an attacker can view or modify user data causing limited impact on confidentiality and integrity of the application.
AuthZ
Under certain conditions SAP Enable Now (SAP Workforce Performance Builder - Manager), versions - 1.0, 10
CVE-2021-27637
4.6 - Medium
- June 09, 2021
Under certain conditions SAP Enable Now (SAP Workforce Performance Builder - Manager), versions - 1.0, 10 allows an attacker to access information which would otherwise be restricted leading to information disclosure.
SAP Enable Now, before version 1911, sends the Session ID cookie value in URL
CVE-2020-6178
- March 10, 2020
SAP Enable Now, before version 1911, sends the Session ID cookie value in URL. This might be stolen from the browser history or log files, leading to Information Disclosure.
SAP Enable Now, before version 1908, does not invalidate session tokens in a timely manner
CVE-2020-6197
- March 10, 2020
SAP Enable Now, before version 1908, does not invalidate session tokens in a timely manner. The Insufficient Session Expiration may allow attackers with local access, for instance, to still download the portables.
SAP Enable Now, before version 1911
CVE-2019-0403
9.8 - Critical
- December 11, 2019
SAP Enable Now, before version 1911, allows an attacker to input commands into the CSV files, which will be executed when opened, leading to CSV Command Injection.
CSV Injection
SAP Enable Now
CVE-2019-0404
7.5 - High
- December 11, 2019
SAP Enable Now, before version 1911, leaks information about network configuration in the server error messages, leading to Information Disclosure.
Generation of Error Message Containing Sensitive Information
SAP Enable Now, before version 1911, leaks information about the existence of a particular user
CVE-2019-0405
7.5 - High
- December 11, 2019
SAP Enable Now, before version 1911, leaks information about the existence of a particular user which can be used to construct a list of users, leading to a user enumeration vulnerability and Information Disclosure.
Information Disclosure
SAP Enable Now
CVE-2019-0385
6.5 - Medium
- November 13, 2019
SAP Enable Now, before version 1908, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
XSS
The XML parser
CVE-2019-0340
5.4 - Medium
- August 14, 2019
The XML parser, which is being used by SAP Enable Now, before version 1902, has not been hardened correctly, leading to Missing XML Validation vulnerability. This issue affects the file upload at multiple locations. An attacker can read local XXE files.
XXE
The session cookie used by SAP Enable Now, version 1902, does not have the HttpOnly flag set
CVE-2019-0341
8.8 - High
- August 14, 2019
The session cookie used by SAP Enable Now, version 1902, does not have the HttpOnly flag set. If an attacker runs script code in the context of the application, he could get access to the session cookie. The session cookie could then be abused to gain access to the application.
Incorrect Permission Assignment for Critical Resource
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for SAP Enable Now or by SAP? Click the Watch button to subscribe.