Monthly Digest
Patch IntelligenceApril 2026 SAP Security Patches
Every SAP Security Note from Patch Tuesday, ranked by what actually matters to your landscape. Tier 1 products are in almost every SAP shop — missing a patch there is career-ending for BASIS admins.
8
patches this month
2
critical
4
high
2026-04-14
Patch Tuesday
Tier 1 — Mission Critical
Products in virtually every SAP environment. Patch these first, every month.
Remote Code Execution via ICM HTTP Request Smuggling
The Internet Communication Manager (ICM) mishandles chunked transfer-encoding headers, allowing an unauthenticated attacker to smuggle a second request and execute arbitrary OS commands as <sid>adm. No authentication required.
Privilege Escalation via XS Advanced Container Runtime
An authenticated low-privilege user in the XS Advanced runtime can abuse a container lifecycle callback to inject commands that execute as the SYSTEM user. Affects HANA 2.0 SPS 07 and earlier.
Missing Authorization Check in Purchase Order Approval API
The REST endpoint for programmatic PO approval does not validate object-level authorization. An authenticated user with Create Purchase Requisition access can approve their own orders up to any value.
DLL Side-Loading via Malicious Update Server Response
The Business Client auto-update mechanism does not validate the integrity of downloaded DLL payloads. An attacker with network access between the client and update server can substitute a malicious DLL that executes with the user's privileges at next launch.
Stored XSS in Launchpad Tile Configuration
Fiori Launchpad fails to sanitise tile subtitle text before rendering. An admin-level user can inject persistent JavaScript that executes in the browser context of any user who views the affected tile group.
Tier 2 — Notable This Month
Real deployments with something worth acting on in April.
Unauthenticated Access to Diagnostics Agent RFC Interface
The Diagnostics Agent on managed systems exposes an RFC interface without authentication checks when called via SolMan's internal SOAP gateway. An attacker with network access to the SolMan host can invoke arbitrary RFMs on connected managed systems.
HTTP/2 Request Smuggling Enables Backend Cache Poisoning
A flaw in the HTTP/2 to HTTP/1.1 downgrade path allows smuggled requests to be cached by the backend ICM as legitimate responses. Attackers can poison cached content served to subsequent users.
SSRF via Destination Service URL Validation Bypass
The BTP Destination Service fails to fully validate user-supplied target URLs, allowing a low-privilege BTP user to proxy requests to internal cloud infrastructure metadata endpoints.
Previous months