{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T10:24:08.462","vulnerabilities":[{"cve":{"id":"CVE-2026-27684","sourceIdentifier":"cna@sap.com","published":"2026-03-10T17:38:10.767","lastModified":"2026-03-11T13:53:47.157","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"SAP NetWeaver Feedback Notifications Service contains a SQL injection vulnerability that allows an authenticated attacker to inject arbitrary SQL code through user-controlled input fields. The application concatenates these inputs directly into SQL queries without proper validation or escaping. As a result, an attacker can manipulate the WHERE clause logic and potentially gain unauthorized access to or modify database information. This vulnerability has no impact on integrity and low impact on the confidentiality and availability of the application."},{"lang":"es","value":"SAP NetWeaver Feedback Notifications Service contiene una vulnerabilidad de inyección SQL que permite a un atacante autenticado inyectar código SQL arbitrario a través de campos de entrada controlados por el usuario. La aplicación concatena estas entradas directamente en consultas SQL sin una validación o escape adecuados. Como resultado, un atacante puede manipular la lógica de la cláusula WHERE y potencialmente obtener acceso no autorizado o modificar información de la base de datos. Esta vulnerabilidad no tiene impacto en la integridad y bajo impacto en la confidencialidad y disponibilidad de la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":2.7}]},"weaknesses":[{"source":"cna@sap.com","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"references":[{"url":"https://me.sap.com/notes/3697355","source":"cna@sap.com"},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com"}]}}]}