CVE-2026-0500 PUBLISHED

Remote code execution in SAP Wily Introscope Enterprise Manager (WorkStation)

Assigner: sap
Reserved: 09.12.2025 Published: 13.01.2026 Updated: 13.01.2026

Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.6

Product Status

Vendor SAP_SE
Product SAP Wily Introscope Enterprise Manager (WorkStation)
Versions Default: unaffected
  • Version WILY_INTRO_ENTERPRISE 10.8 is affected

References

Problem Types