CVE-2026-24325

4.8 MEDIUM

📋 TL;DR

This stored XSS vulnerability in SAP BusinessObjects Enterprise allows admin users to inject malicious JavaScript into web pages. When other users visit compromised pages, the script executes in their browser context. Only admin users can exploit this vulnerability, limiting the attack surface.

💻 Affected Systems

Products:
  • SAP BusinessObjects Enterprise
Versions: Specific versions not provided in CVE description; check SAP Note 3697256 for details
Operating Systems: All platforms running SAP BusinessObjects Enterprise
Default Config Vulnerable: ⚠️ Yes
Notes: Only admin users can exploit this vulnerability; regular users cannot trigger it

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Admin user could steal session cookies, redirect users to malicious sites, or perform actions on behalf of other users, potentially leading to data theft or account compromise.

🟠

Likely Case

Admin user could deface pages, display misleading information, or capture limited user data through client-side attacks.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented entirely.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges and knowledge of vulnerable input fields

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3697256 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3697256

Restart Required: Yes

Instructions:

1. Review SAP Note 3697256 for specific patch details
2. Apply the security patch from SAP Support Portal
3. Restart SAP BusinessObjects services
4. Verify the fix by testing previously vulnerable inputs

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for user-controlled fields

Custom implementation required based on application code

Content Security Policy

all

Implement CSP headers to restrict script execution

Add 'Content-Security-Policy' header to web server configuration

🧯 If You Can't Patch

  • Restrict admin privileges to trusted personnel only
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test user-controlled input fields for proper output encoding by attempting to inject script tags

Check Version:

Check SAP BusinessObjects version through Central Management Console or via command: 'java -version' for Java-based components

Verify Fix Applied:

After patching, attempt XSS payload injection in previously vulnerable fields and verify scripts do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity modifying web content
  • JavaScript payloads in input fields in application logs

Network Indicators:

  • Unexpected script tags in HTTP requests to BusinessObjects endpoints

SIEM Query:

source="businessobjects" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export