Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap Se
Sap Se business Server Pages Application (taf Applauncher) |
|
| Vendors & Products |
Sap Se
Sap Se business Server Pages Application (taf Applauncher) |
Tue, 12 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP TAF_APPLAUNCHER within Business Server Pages allows an unauthenticated attacker to craft malicious links that, when clicked by a victim, redirects them to attacker?controlled sites, potentially exposing or altering sensitive information in the victim�s browser. This results in a low impact on confidentiality and integrity, with no impact on the availability of the application. | |
| Title | Cross-Site Scripting (XSS) vulnerability in Business Server Pages Application (TAF_APPLAUNCHER) | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2026-05-12T12:59:48.203Z
Reserved: 2026-04-09T17:29:44.663Z
Link: CVE-2026-40137
Updated: 2026-05-12T12:59:45.143Z
Status : Awaiting Analysis
Published: 2026-05-12T03:16:12.693
Modified: 2026-05-12T14:19:41.400
Link: CVE-2026-40137
No data.
OpenCVE Enrichment
Updated: 2026-05-12T04:30:07Z