Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42873: CWE-405: Asymmetric Resource Consumption in SAP_SE SAPUI5 framework (Markdown-it component)

0
Medium
VulnerabilityCVE-2025-42873cvecve-2025-42873cwe-405
Published: Tue Dec 09 2025 (12/09/2025, 02:14:07 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAPUI5 framework (Markdown-it component)

Description

SAPUI5 (and OpenUI5) packages use outdated 3rd party libraries with known security vulnerabilities. When markdown-it encounters special malformed input, it fails to terminate properly, resulting in an infinite loop. This Denial of Service via infinite loop causes high CPU usage and system unresponsiveness due to a blocked processing thread. This vulnerability has no impact on confidentiality or integrity but has a high impact on system availability.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:51:37 UTC

Technical Analysis

CVE-2025-42873 is a vulnerability identified in the SAPUI5 framework, specifically within the Markdown-it component used for rendering markdown content. The root cause is the use of outdated third-party libraries that contain known security flaws. When the Markdown-it parser processes specially crafted malformed input, it enters an infinite loop due to improper termination conditions. This infinite loop causes excessive CPU consumption, leading to Denial of Service (DoS) by making the system unresponsive and blocking the processing thread responsible for handling requests. The vulnerability affects SAP_UI versions 755, 756, 757, and 758. The attack vector is network-based, requiring no privileges or user interaction, but the complexity is high due to the need to craft specific malformed markdown input. The vulnerability impacts system availability but does not affect confidentiality or integrity of data. No patches were available at the time of disclosure, and no known exploits have been observed in the wild. The CVSS 3.1 base score is 5.9, reflecting a medium severity rating. This vulnerability is classified under CWE-405 (Asymmetric Resource Consumption), highlighting that the resource exhaustion arises from malformed input causing disproportionate processing overhead. Organizations using SAPUI5 for web applications or enterprise portals should be aware of this risk, as it can disrupt service availability and degrade user experience.

Potential Impact

For European organizations, the primary impact of CVE-2025-42873 is on system availability. SAPUI5 is widely used in enterprise environments across Europe for building business-critical web applications and portals. An attacker exploiting this vulnerability can cause high CPU usage leading to system unresponsiveness or downtime, potentially disrupting business operations, customer-facing services, and internal workflows. This can result in operational delays, financial losses, and reputational damage. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, the denial of service can indirectly affect compliance with service-level agreements (SLAs) and regulatory requirements for uptime and availability. Organizations in sectors such as finance, manufacturing, public administration, and utilities that rely heavily on SAPUI5-based applications are particularly vulnerable. The lack of available patches at disclosure increases the window of exposure, emphasizing the need for proactive mitigation. Additionally, the medium CVSS score suggests that while exploitation is not trivial, motivated attackers with network access could leverage this vulnerability to disrupt services.

Mitigation Recommendations

1. Monitor system and application logs for unusual CPU spikes or performance degradation in SAPUI5 applications, especially those rendering markdown content. 2. Restrict network access to SAPUI5 interfaces to trusted users and IP ranges using firewalls or network segmentation to reduce exposure. 3. Implement input validation and sanitization at the application layer to detect and block malformed markdown input before it reaches the Markdown-it parser. 4. Deploy rate limiting or request throttling on endpoints processing markdown content to mitigate potential DoS attempts. 5. Engage with SAP support channels to obtain and apply official patches or updates as soon as they become available. 6. Consider temporary workarounds such as disabling markdown rendering features if feasible until patches are applied. 7. Conduct regular security assessments and penetration testing focusing on input handling in SAPUI5 applications. 8. Educate development and operations teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96b8

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:51:37 AM

Last updated: 12/11/2025, 3:19:02 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats