Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23186: CWE-94: Improper Control of Generation of Code ('Code Injection') in SAP_SE SAP NetWeaver Application Server ABAP

0
High
VulnerabilityCVE-2025-23186cvecve-2025-23186cwe-94
Published: Tue Apr 08 2025 (04/08/2025, 07:10:22 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server ABAP

Description

In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:53:53 UTC

Technical Analysis

CVE-2025-23186 is a code injection vulnerability classified under CWE-94 affecting SAP NetWeaver Application Server ABAP. The flaw arises when the system improperly controls the generation of code during Remote Function Call (RFC) requests. An authenticated attacker with low privileges can craft RFC requests directed at restricted destinations, which should normally be inaccessible. By exploiting this, the attacker can expose credentials used by the remote service. These credentials can then be leveraged to gain unauthorized access and potentially take full control over the remote service, leading to a complete compromise of confidentiality, integrity, and availability. The vulnerability affects multiple versions of SAP NetWeaver, including 7.22, 7.53, 7.54, 7.77, 7.89, and 7.93. The CVSS v3.1 score is 8.5, indicating high severity, with attack vector being network-based, requiring low privileges but no user interaction, and having a scope change due to the ability to compromise remote services. Although no exploits have been observed in the wild yet, the vulnerability's nature and impact potential make it a critical concern for organizations using SAP NetWeaver Application Server ABAP.

Potential Impact

The exploitation of CVE-2025-23186 can have severe consequences for organizations worldwide that rely on SAP NetWeaver Application Server ABAP. Attackers can gain unauthorized access to sensitive credentials, enabling them to compromise remote services fully. This can lead to data breaches exposing confidential information, unauthorized modification or deletion of critical business data, and disruption of essential business processes due to service unavailability. Given SAP NetWeaver's widespread use in enterprise resource planning (ERP) and critical business applications, successful exploitation could result in significant operational and financial damage, regulatory penalties, and reputational harm. The vulnerability's ability to affect multiple versions increases the attack surface, and the network-based attack vector means attackers can exploit it remotely, increasing risk especially in environments with exposed SAP interfaces.

Mitigation Recommendations

To mitigate CVE-2025-23186 effectively, organizations should prioritize the following actions: 1) Apply SAP-provided patches or updates as soon as they become available for all affected SAP NetWeaver versions. 2) Restrict and monitor access to RFC interfaces, ensuring only trusted and necessary systems and users have permissions to initiate RFC calls, especially to restricted destinations. 3) Implement strict network segmentation and firewall rules to limit exposure of SAP NetWeaver servers and restrict inbound traffic to known and authorized sources. 4) Conduct regular audits of RFC destinations and credentials to detect any unauthorized changes or suspicious activity. 5) Employ enhanced logging and monitoring of SAP NetWeaver systems to detect anomalous RFC requests or credential usage patterns. 6) Use SAP security notes and tools to verify system configurations and compliance with security best practices. 7) Educate administrators and developers about the risks of code injection and the importance of secure coding and configuration practices within SAP environments. These targeted measures go beyond generic advice by focusing on controlling RFC access and credential exposure specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-01-13T11:13:59.546Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1bf85912abc71d0ac32

Added to database: 2/26/2026, 7:40:47 PM

Last enriched: 2/26/2026, 7:53:53 PM

Last updated: 2/26/2026, 11:16:38 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses