Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26654: CWE-319: Cleartext Transmission of Sensitive Information in SAP_SE SAP Commerce Cloud (Public Cloud)

0
Medium
VulnerabilityCVE-2025-26654cvecve-2025-26654cwe-319
Published: Tue Apr 08 2025 (04/08/2025, 07:13:04 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Commerce Cloud (Public Cloud)

Description

SAP Commerce Cloud (Public Cloud) does not allow to disable unencrypted HTTP (port 80) entirely, but instead allows a redirect from port 80 to 443 (HTTPS). As a result, Commerce normally communicates securely over HTTPS. However, the confidentiality and integrity of data sent on the first request before the redirect may be impacted if the client is configured to use HTTP and sends confidential data on the first request before the redirect.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:55:49 UTC

Technical Analysis

CVE-2025-26654 is a vulnerability classified under CWE-319 (Cleartext Transmission of Sensitive Information) affecting SAP Commerce Cloud (Public Cloud), specifically version COM_CLOUD 2211. The core issue arises because the platform does not permit disabling unencrypted HTTP (port 80) outright; instead, it performs an HTTP to HTTPS redirect. While subsequent communications occur securely over HTTPS, the initial HTTP request before the redirect is transmitted in cleartext. If a client is configured to send sensitive information (such as authentication tokens, credentials, or personal data) in this initial request, that data can be intercepted or modified by an attacker positioned on the network path, such as in a man-in-the-middle (MITM) attack. The vulnerability impacts the confidentiality and integrity of data but does not affect availability. The CVSS v3.1 vector (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) indicates that the attack requires adjacent network access with high attack complexity, no privileges, and no user interaction, affecting confidentiality and integrity with unchanged scope. No patches or exploits are currently reported, but the issue stems from architectural constraints in the platform's handling of HTTP traffic. This vulnerability highlights the risk of relying solely on HTTP to HTTPS redirection without the ability to enforce HTTPS-only connections from the outset.

Potential Impact

The primary impact of CVE-2025-26654 is the potential exposure of sensitive data transmitted in the initial HTTP request before redirection to HTTPS. This can lead to unauthorized disclosure of confidential information such as login credentials, session tokens, or personal customer data, compromising user privacy and organizational security. Integrity may also be affected if an attacker modifies the initial request, potentially leading to unauthorized actions or data corruption. Although the vulnerability does not affect system availability, the breach of confidentiality and integrity can result in significant reputational damage, regulatory penalties (especially under data protection laws like GDPR), and financial losses. Organizations relying on SAP Commerce Cloud for e-commerce operations may face increased risk of data breaches, fraud, and customer trust erosion. The attack complexity is high due to the need for network proximity, but in environments with untrusted or public networks, the risk is more pronounced. The inability to disable HTTP entirely limits the enforcement of strict transport security policies, increasing the attack surface.

Mitigation Recommendations

To mitigate CVE-2025-26654, organizations should implement the following specific measures: 1) Configure client applications and browsers to avoid sending sensitive information in the initial HTTP request; ensure all sensitive data is transmitted only after HTTPS is established. 2) Employ HTTP Strict Transport Security (HSTS) with preload lists where possible to enforce HTTPS connections and prevent downgrade attacks. 3) Use network-level protections such as VPNs or secure tunnels to protect traffic on untrusted networks, reducing the risk of interception. 4) Monitor network traffic for signs of man-in-the-middle attacks or unusual HTTP requests containing sensitive data. 5) Educate developers and administrators on secure coding and configuration practices to avoid embedding sensitive data in URLs or headers sent over HTTP. 6) Engage with SAP support to track any forthcoming patches or configuration options that may allow disabling HTTP entirely or improving redirect security. 7) Consider deploying web application firewalls (WAFs) to detect and block suspicious HTTP traffic patterns. These targeted actions go beyond generic advice by focusing on client configuration, network security, and proactive monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-02-12T21:05:31.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1bf85912abc71d0ac49

Added to database: 2/26/2026, 7:40:47 PM

Last enriched: 2/26/2026, 7:55:49 PM

Last updated: 2/26/2026, 11:18:51 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses