critical2026-05-12SAP Commerce CloudCVE-2026-34263

Missing Authentication Check in SAP Commerce Cloud Configuration Upload

SAP Commerce Cloud

Our Take

Unauthenticated RCE on an internet-facing e-commerce platform is the worst possible combination. The required rebuild and redeployment makes this operationally significant, but the alternative is leaving the door open. If you run SAP Commerce Cloud, treat this as a P0.

Vulnerability Detail

An overly permissive Spring Security configuration with incorrect rule ordering allows unauthenticated users to access the configuration upload functionality. An attacker can upload malicious configuration that triggers code injection, resulting in arbitrary server-side code execution. The fix requires a rebuild and redeployment of the affected application.

Workaround

Restrict network-level access to the configuration upload endpoints until the rebuild and redeployment is complete.

Patch Action

Apply SAP Note 3733064. Note: requires a full rebuild and redeployment of SAP Commerce Cloud — coordinate with your DevOps team.

Affected Versions

HY_COM 2205
COM_CLOUD 2211
COM_CLOUD 2211-JDK21

Patch Info

Priority

🔴 Patch immediately

CVSS Score

9.6

SAP Note

3733064

CVE

CVE-2026-34263

Published

2026-05-12

All content is editorial summary, not professional security advice. CVSS scores and SAP Note IDs are factual references. Patch timing is the responsibility of your security team based on your environment and SAP's official guidance.
← All patches