{
  "affected": [
    {
      "database_specific": {
        "unresolved_ranges": [
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.10"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.11"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.30"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.31"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.40"
              }
            ]
          },
          {
            "events": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "7.50"
              }
            ]
          }
        ]
      }
    }
  ],
  "details": "SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.",
  "id": "CVE-2021-37531",
  "modified": "2026-03-14T13:48:14.048736922Z",
  "published": "2021-09-14T12:15:10.030Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html"
    },
    {
      "type": "ADVISORY",
      "url": "http://seclists.org/fulldisclosure/2022/Jan/75"
    },
    {
      "type": "ADVISORY",
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405"
    },
    {
      "type": "REPORT",
      "url": "https://launchpad.support.sap.com/#/notes/3081888"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}