{"id":"CVE-2021-37531","details":"SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.","modified":"2026-03-14T14:51:19.328295Z","published":"2021-09-14T12:15:10.030Z","references":[{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2022/Jan/75"},{"type":"ADVISORY","url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405"},{"type":"REPORT","url":"https://launchpad.support.sap.com/#/notes/3081888"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.11"}]},{"events":[{"introduced":"0"},{"last_affected":"7.30"}]},{"events":[{"introduced":"0"},{"last_affected":"7.31"}]},{"events":[{"introduced":"0"},{"last_affected":"7.40"}]},{"events":[{"introduced":"0"},{"last_affected":"7.50"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-37531.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}