SAP Landscape Transformation RFC Function Module Code Injection Vulnerability
CVE-2026-27675 Published on April 14, 2026
Code Injection vulnerability in SAP Landscape Transformation
SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted.
Vulnerability Analysis
CVE-2026-27675 can be exploited with network access, requires user interaction and user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
What is a Code Injection Vulnerability?
The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CVE-2026-27675 has been classified to as a Code Injection vulnerability or weakness.
Affected Versions
SAP_SE SAP Landscape Transformation:- Version DMIS 2011_1_700 is affected.
- Version 2011_1_710 is affected.
- Version 2011_1_730 is affected.
- Version 2011_1_731 is affected.
- Version 2011_1_752 is affected.
- Version 2020 is affected.
- Version S4CORE 102 is affected.
- Version 103 is affected.
- Version 104 is affected.
- Version 105 is affected.
- Version 106 is affected.
- Version 107 is affected.
- Version 108 is affected.
- Version 109 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.