SAP Commerce Cloud Cart Entry Race Condition
CVE-2026-23684 Published on February 10, 2026

Race condition vulnerability in SAP Commerce Cloud
A race condition vulnerability exists in the SAP Commerce cloud. Because of this when an attacker adds products to a cart, it may result in a cart entry being created with erroneous product value which could be checked out. This leads to high impact on data integrity, with no impact on data confidentiality or availability of the application.

NVD

Vulnerability Analysis

CVE-2026-23684 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
HIGH
Availability Impact:
NONE

Weakness Type

Race Condition within a Thread

If two threads of execution use a resource simultaneously, there exists the possibility that resources may be used while invalid, in turn making the state of execution undefined.


Products Associated with CVE-2026-23684

Want to know whenever a new CVE is published for SAP Commerce Cloud? stack.watch will email you.

 

Affected Versions

SAP_SE SAP Commerce Cloud:

Exploit Probability

EPSS
0.04%
Percentile
10.44%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.