Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
- Last update: 14/04/2026
- Affected software:
→ SAP Business Planning and Consolidation
. HANABPC 810, BPC4HANA 300
→ SAP Business Warehouse
. SAP_BW 750, 752, 753, 754, 755, 756, 757, 758, 816- Type: Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)
- CVE/CVSS
→ CVE-2026-27681: 9.9 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-27681
As part of its monthly Security Patch Day, SAP released 19 new security notes and one update addressing multiple vulnerabilities, including critical issues such as SQL injection, denial of service (DoS), and code injection.
Among them, CVE-2026-27681 is a critical SQL injection vulnerability affecting SAP Business Planning and Consolidation (BPC) and SAP Business Warehouse (BW). Successful exploitation could allow attackers to execute arbitrary SQL commands and fully compromise affected systems.
CVE-2026-27681 (CVSS 9.9) is caused by insufficient authorization checks, allowing an authenticated user with low privileges to execute arbitrary SQL commands, potentially leading to unauthorised access and data manipulation.
This could result in unauthorized access to sensitive database information, modification of critical business data, and potential denial of service through data deletion or manipulation, highly impacting the confidentiality, integrity, and availability of the system.
In addition to the critical vulnerability, SAP addressed other high and medium severity vulnerabilities, including:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable instances with the highest priority after thorough testing.
SAP strongly recommends that the customer visits the support portal and applies patches on priority to protect their SAP landscape.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
NVD - https://nvd.nist.gov/vuln/detail/CVE-2026-27681
SAP SE - <https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2026.html>
SAP SE - https://me.sap.com/notes/3719353
GB hackers - https://gbhackers.com/sap-patch-day-fixes-critical-flaws/