SAP GUI for Windows allows DLL files to be loaded from...
Moderate severity
Unreviewed
Published
Mar 10, 2026
to the GitHub Advisory Database
•
Updated Mar 10, 2026
Description
Published by the National Vulnerability Database
Mar 10, 2026
Published to the GitHub Advisory Database
Mar 10, 2026
Last updated
Mar 10, 2026
SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability.
References