CVE-2026-0500

Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
References
Link Resource
https://me.sap.com/notes/3668679 Permissions Required
https://url.sap/sapsecuritypatchday Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:introscope_enterprise_manager:10.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-13 02:15

Updated : 2026-01-22 18:47


NVD link : CVE-2026-0500

Mitre link : CVE-2026-0500

CVE.ORG link : CVE-2026-0500


JSON object : View

Products Affected

sap

  • introscope_enterprise_manager
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')