sas CVE Vulnerabilities & Metrics

Focus on sas vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About sas Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with sas. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total sas CVEs: 11
Earliest CVE date: 16 May 2002, 04:00 UTC
Latest CVE date: 12 Dec 2023, 10:15 UTC

Latest CVE reference: CVE-2023-4932

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical sas CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.53

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 6
7.0-8.9 5
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS sas CVEs

These are the five CVEs with the highest CVSS scores for sas, sorted by severity first and recency.

All CVEs for sas

CVE-2023-4932 sas vulnerability CVSS: 0 12 Dec 2023, 10:15 UTC

SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.

CVE-2023-24724 sas vulnerability CVSS: 0 03 Apr 2023, 22:15 UTC

A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3.

CVE-2022-25256 sas vulnerability CVSS: 4.3 19 Feb 2022, 01:15 UTC

SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.

CVE-2021-41569 sas vulnerability CVSS: 5.0 19 Nov 2021, 18:15 UTC

SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.

CVE-2021-35475 sas vulnerability CVSS: 3.5 25 Jun 2021, 11:15 UTC

SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.

CVE-2020-9350 sas vulnerability CVSS: 3.5 23 Feb 2020, 01:15 UTC

Graph Builder in SAS Visual Analytics 8.5 allows XSS via a graph template that is accessed directly.

CVE-2019-14678 sas vulnerability CVSS: 7.5 14 Nov 2019, 21:15 UTC

SAS XML Mapper 9.45 has an XML External Entity (XXE) vulnerability that can be leveraged by malicious attackers in multiple ways. Examples are Local File Reading, Out Of Band File Exfiltration, Server Side Request Forgery, and/or Potential Denial of Service attacks. This vulnerability also affects the XMLV2 LIBNAME engine when the AUTOMAP option is used.

CVE-2007-6763 sas vulnerability CVSS: 6.5 31 Jul 2019, 18:15 UTC

SAS Drug Development (SDD) before 32DRG02 mishandles logout actions, which allows a user (who was previously logged in) to access resources by pressing a back or forward button in a web browser.

CVE-2018-20733 sas vulnerability CVSS: 5.0 17 Jan 2019, 01:29 UTC

BI Web Services in SAS Web Infrastructure Platform before 9.4M6 allows XXE.

CVE-2018-20732 sas vulnerability CVSS: 7.5 17 Jan 2019, 01:29 UTC

SAS Web Infrastructure Platform before 9.4M6 allows remote attackers to execute arbitrary code via a Java deserialization variant.

CVE-2015-9281 sas vulnerability CVSS: 4.3 17 Jan 2019, 01:29 UTC

Logon Manager in SAS Web Infrastructure Platform before 9.4M3 allows reflected XSS on the Timeout page.

CVE-2014-5454 sas vulnerability CVSS: 6.0 25 Aug 2014, 16:55 UTC

Unrestricted file upload vulnerability in the image upload module in SAS Visual Analytics 6.4M1 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.

CVE-2014-2262 sas vulnerability CVSS: 9.3 01 Mar 2014, 00:55 UTC

Buffer overflow in the client application in Base SAS 9.2 TS2M3, SAS 9.3 TS1M1 and TS1M2, and SAS 9.4 TS1M0 allows user-assisted remote attackers to execute arbitrary code via a crafted SAS program.

CVE-2002-2017 sas vulnerability CVSS: 10.0 31 Dec 2002, 05:00 UTC

sastcpd in SAS/Base 8.0 allows local users to execute arbitrary code by setting the authprog environment variable to reference a malicious program, which is then executed by sastcpd.

CVE-2002-2018 sas vulnerability CVSS: 7.2 31 Dec 2002, 05:00 UTC

sastcpd in SAS/Base 8.0 might allow local users to gain privileges by setting the netencralg environment variable, which causes a segmentation fault.

CVE-2002-0218 sas vulnerability CVSS: 7.2 16 May 2002, 04:00 UTC

Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument.

CVE-2002-0219 sas vulnerability CVSS: 7.2 16 May 2002, 04:00 UTC

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.