SAP BW Service API Missing Auth Check Enables Unauthorized RFC Changes
CVE-2026-27686 Published on March 10, 2026
Missing Authorization check in SAP Business Warehouse (Service API)
Due to a Missing Authorization Check in SAP Business Warehouse (Service API), an authenticated attacker could perform unauthorized actions via an affected RFC function module. Successful exploitation could enable unauthorized configuration and control changes, potentially disrupting request processing and causing denial of service. This results in low impact on integrity and high impact on availability, while confidentiality remains unaffected.
Vulnerability Analysis
CVE-2026-27686 is exploitable with network access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and a high impact on availability.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2026-27686 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2026-27686
Want to know whenever a new CVE is published for SAP Business Warehouse? stack.watch will email you.
Affected Versions
SAP_SE SAP Business Warehouse (Service API):- Version DW4CORE 200 is affected.
- Version 300 is affected.
- Version 400 is affected.
- Version PI_BASIS 2006_1_700 is affected.
- Version 701 is affected.
- Version 702 is affected.
- Version 730 is affected.
- Version 731 is affected.
- Version 740 is affected.
- Version SAP_BW 750 is affected.
- Version 751 is affected.
- Version 752 is affected.
- Version 753 is affected.
- Version 754 is affected.
- Version 755 is affected.
- Version 756 is affected.
- Version 757 is affected.
- Version 758 is affected.
- Version 816 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.