CVE-2025-23186: CWE-94: Improper Control of Generation of Code ('Code Injection') in SAP_SE SAP NetWeaver Application Server ABAP
In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application.
AI Analysis
Technical Summary
CVE-2025-23186 is a code injection vulnerability classified under CWE-94 affecting SAP NetWeaver Application Server ABAP. The flaw arises when the system improperly controls the generation of code during Remote Function Call (RFC) requests. An authenticated attacker with low privileges can craft RFC requests directed at restricted destinations, which should normally be inaccessible. By exploiting this, the attacker can expose credentials used by the remote service. These credentials can then be leveraged to gain unauthorized access and potentially take full control over the remote service, leading to a complete compromise of confidentiality, integrity, and availability. The vulnerability affects multiple versions of SAP NetWeaver, including 7.22, 7.53, 7.54, 7.77, 7.89, and 7.93. The CVSS v3.1 score is 8.5, indicating high severity, with attack vector being network-based, requiring low privileges but no user interaction, and having a scope change due to the ability to compromise remote services. Although no exploits have been observed in the wild yet, the vulnerability's nature and impact potential make it a critical concern for organizations using SAP NetWeaver Application Server ABAP.
Potential Impact
The exploitation of CVE-2025-23186 can have severe consequences for organizations worldwide that rely on SAP NetWeaver Application Server ABAP. Attackers can gain unauthorized access to sensitive credentials, enabling them to compromise remote services fully. This can lead to data breaches exposing confidential information, unauthorized modification or deletion of critical business data, and disruption of essential business processes due to service unavailability. Given SAP NetWeaver's widespread use in enterprise resource planning (ERP) and critical business applications, successful exploitation could result in significant operational and financial damage, regulatory penalties, and reputational harm. The vulnerability's ability to affect multiple versions increases the attack surface, and the network-based attack vector means attackers can exploit it remotely, increasing risk especially in environments with exposed SAP interfaces.
Mitigation Recommendations
To mitigate CVE-2025-23186 effectively, organizations should prioritize the following actions: 1) Apply SAP-provided patches or updates as soon as they become available for all affected SAP NetWeaver versions. 2) Restrict and monitor access to RFC interfaces, ensuring only trusted and necessary systems and users have permissions to initiate RFC calls, especially to restricted destinations. 3) Implement strict network segmentation and firewall rules to limit exposure of SAP NetWeaver servers and restrict inbound traffic to known and authorized sources. 4) Conduct regular audits of RFC destinations and credentials to detect any unauthorized changes or suspicious activity. 5) Employ enhanced logging and monitoring of SAP NetWeaver systems to detect anomalous RFC requests or credential usage patterns. 6) Use SAP security notes and tools to verify system configurations and compliance with security best practices. 7) Educate administrators and developers about the risks of code injection and the importance of secure coding and configuration practices within SAP environments. These targeted measures go beyond generic advice by focusing on controlling RFC access and credential exposure specific to this vulnerability.
Affected Countries
United States, Germany, India, United Kingdom, Japan, Australia, Canada, France, Brazil, Netherlands, South Korea, China, Italy
CVE-2025-23186: CWE-94: Improper Control of Generation of Code ('Code Injection') in SAP_SE SAP NetWeaver Application Server ABAP
Description
In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-23186 is a code injection vulnerability classified under CWE-94 affecting SAP NetWeaver Application Server ABAP. The flaw arises when the system improperly controls the generation of code during Remote Function Call (RFC) requests. An authenticated attacker with low privileges can craft RFC requests directed at restricted destinations, which should normally be inaccessible. By exploiting this, the attacker can expose credentials used by the remote service. These credentials can then be leveraged to gain unauthorized access and potentially take full control over the remote service, leading to a complete compromise of confidentiality, integrity, and availability. The vulnerability affects multiple versions of SAP NetWeaver, including 7.22, 7.53, 7.54, 7.77, 7.89, and 7.93. The CVSS v3.1 score is 8.5, indicating high severity, with attack vector being network-based, requiring low privileges but no user interaction, and having a scope change due to the ability to compromise remote services. Although no exploits have been observed in the wild yet, the vulnerability's nature and impact potential make it a critical concern for organizations using SAP NetWeaver Application Server ABAP.
Potential Impact
The exploitation of CVE-2025-23186 can have severe consequences for organizations worldwide that rely on SAP NetWeaver Application Server ABAP. Attackers can gain unauthorized access to sensitive credentials, enabling them to compromise remote services fully. This can lead to data breaches exposing confidential information, unauthorized modification or deletion of critical business data, and disruption of essential business processes due to service unavailability. Given SAP NetWeaver's widespread use in enterprise resource planning (ERP) and critical business applications, successful exploitation could result in significant operational and financial damage, regulatory penalties, and reputational harm. The vulnerability's ability to affect multiple versions increases the attack surface, and the network-based attack vector means attackers can exploit it remotely, increasing risk especially in environments with exposed SAP interfaces.
Mitigation Recommendations
To mitigate CVE-2025-23186 effectively, organizations should prioritize the following actions: 1) Apply SAP-provided patches or updates as soon as they become available for all affected SAP NetWeaver versions. 2) Restrict and monitor access to RFC interfaces, ensuring only trusted and necessary systems and users have permissions to initiate RFC calls, especially to restricted destinations. 3) Implement strict network segmentation and firewall rules to limit exposure of SAP NetWeaver servers and restrict inbound traffic to known and authorized sources. 4) Conduct regular audits of RFC destinations and credentials to detect any unauthorized changes or suspicious activity. 5) Employ enhanced logging and monitoring of SAP NetWeaver systems to detect anomalous RFC requests or credential usage patterns. 6) Use SAP security notes and tools to verify system configurations and compliance with security best practices. 7) Educate administrators and developers about the risks of code injection and the importance of secure coding and configuration practices within SAP environments. These targeted measures go beyond generic advice by focusing on controlling RFC access and credential exposure specific to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-01-13T11:13:59.546Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1bf85912abc71d0ac32
Added to database: 2/26/2026, 7:40:47 PM
Last enriched: 2/26/2026, 7:53:53 PM
Last updated: 2/26/2026, 11:16:38 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.