Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42880: CWE-94: Improper Control of Generation of Code in SAP_SE SAP Solution Manager

0
Critical
VulnerabilityCVE-2025-42880cvecve-2025-42880cwe-94
Published: Tue Dec 09 2025 (12/09/2025, 02:15:09 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Solution Manager

Description

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:49:21 UTC

Technical Analysis

CVE-2025-42880 is a critical security vulnerability identified in SAP Solution Manager version ST 720, classified under CWE-94 (Improper Control of Generation of Code). The root cause is the lack of proper input sanitation when processing calls to remote-enabled function modules. An authenticated attacker with at least limited privileges can exploit this flaw by injecting malicious code into these function calls. Because the vulnerability allows code injection, it can lead to arbitrary code execution within the SAP Solution Manager environment. This results in full compromise of the system, affecting confidentiality, integrity, and availability of the SAP infrastructure. The vulnerability has a CVSS v3.1 base score of 9.9, indicating critical severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and scope change. Although no exploits have been reported in the wild yet, the potential impact is severe given SAP Solution Manager's role in managing and monitoring SAP landscapes. The vulnerability could be leveraged to disrupt business processes, exfiltrate sensitive data, or pivot to other internal systems. SAP Solution Manager is widely used in enterprise environments, making this vulnerability a significant risk for organizations relying on SAP for critical operations.

Potential Impact

For European organizations, the impact of CVE-2025-42880 is substantial. SAP Solution Manager is a core component in many large enterprises for managing SAP systems, which are integral to business operations across sectors such as manufacturing, finance, utilities, and public services. Exploitation could lead to unauthorized access to sensitive corporate data, disruption of business-critical processes, and potential downtime affecting service delivery. Given the high severity and the ability to execute arbitrary code, attackers could deploy ransomware, steal intellectual property, or manipulate financial data. The compromise of SAP Solution Manager could also serve as a foothold for lateral movement within corporate networks, amplifying the threat. The lack of known exploits currently provides a window for proactive defense, but the critical nature demands urgent attention to prevent potential future attacks. The impact on confidentiality, integrity, and availability is comprehensive, threatening compliance with European data protection regulations such as GDPR and potentially leading to significant financial and reputational damage.

Mitigation Recommendations

Immediate mitigation steps include: 1) Applying official patches or updates from SAP as soon as they are released for the affected SAP Solution Manager version ST 720. 2) Restricting access to SAP Solution Manager interfaces, especially remote-enabled function modules, to trusted and authenticated users only, employing strong authentication mechanisms such as multi-factor authentication. 3) Implementing network segmentation to isolate SAP Solution Manager from less secure network zones and limit exposure to potential attackers. 4) Monitoring and logging all remote function calls and unusual activities within SAP Solution Manager to detect potential exploitation attempts early. 5) Conducting regular security audits and code reviews of custom function modules to ensure no additional injection vectors exist. 6) Educating administrators and users about the risks and signs of exploitation to improve incident response readiness. 7) Employing application-layer firewalls or SAP-specific security tools that can detect and block malicious input patterns targeting code injection vulnerabilities. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:17.023Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96d0

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:49:21 AM

Last updated: 12/9/2025, 12:00:46 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats