Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42883: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP NetWeaver Application Server for ABAP (Migration Workbench)

0
Low
VulnerabilityCVE-2025-42883cvecve-2025-42883cwe-434
Published: Tue Nov 11 2025 (11/11/2025, 00:13:47 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server for ABAP (Migration Workbench)

Description

Migration Workbench (DX Workbench) in SAP NetWeaver Application Server for ABAP fails to trigger a malware scan when an attacker with administrative privileges uploads files to the application server. An attacker could leverage this and upload a malicious file into the system. This results in a low impact on the integrity of the application.

AI-Powered Analysis

AILast updated: 11/18/2025, 04:46:57 UTC

Technical Analysis

CVE-2025-42883 identifies a vulnerability in the Migration Workbench component of SAP NetWeaver Application Server for ABAP, specifically related to the unrestricted upload of files with dangerous types. The flaw arises because the system fails to trigger malware scanning when files are uploaded by users with administrative privileges. This means that an attacker who has already obtained administrative access can upload malicious files without detection. The vulnerability is classified under CWE-434, which concerns improper restrictions on file uploads. Affected SAP_BASIS versions range from 700 through 816, covering a broad spectrum of SAP NetWeaver releases. The CVSS v3.1 score is 2.7, reflecting low severity due to the requirement for high privileges (PR:H), no user interaction (UI:N), and limited impact on integrity (I:L) without affecting confidentiality or availability. The vulnerability does not currently have known exploits in the wild, and no official patches or security notes have been linked yet. However, the presence of this vulnerability could allow attackers to plant malicious files that might be used in subsequent attacks, such as privilege escalation, lateral movement, or persistence within the SAP environment. Given SAP's critical role in enterprise resource planning and business operations, even low-impact vulnerabilities warrant attention. The technical root cause is the lack of enforced malware scanning on file uploads in the Migration Workbench, which should ideally validate and sanitize all uploaded content regardless of uploader privileges.

Potential Impact

For European organizations, the impact of CVE-2025-42883 is primarily on the integrity of SAP systems. Since exploitation requires administrative privileges, the vulnerability does not directly increase the risk of initial compromise but can facilitate the deployment of malicious files once an attacker has gained high-level access. This could lead to further compromise of SAP environments, potentially affecting business-critical processes such as finance, supply chain, and human resources. The lack of malware scanning on uploaded files increases the risk of malware persistence or the introduction of backdoors. While confidentiality and availability are not directly impacted, the integrity compromise could indirectly lead to data manipulation or disruption of operations. Organizations in sectors heavily reliant on SAP, such as manufacturing, energy, telecommunications, and public administration, may face operational risks if attackers exploit this vulnerability. Additionally, regulatory compliance frameworks in Europe, including GDPR, require maintaining system integrity, so failure to address this vulnerability could have compliance implications.

Mitigation Recommendations

To mitigate CVE-2025-42883, European organizations should implement the following specific measures: 1) Restrict administrative privileges strictly to trusted personnel and enforce the principle of least privilege to minimize the number of users who can upload files. 2) Monitor and audit all file upload activities within the SAP Migration Workbench to detect anomalous or unauthorized uploads promptly. 3) Implement external malware scanning solutions integrated with SAP file upload processes to ensure all uploaded files are scanned regardless of uploader privileges. 4) Apply SAP security patches and notes as soon as they become available for this vulnerability or related components. 5) Harden SAP system configurations by disabling unnecessary file upload functionalities if not required for business processes. 6) Conduct regular security assessments and penetration testing focused on SAP environments to identify and remediate similar weaknesses. 7) Educate SAP administrators on the risks associated with file uploads and the importance of following secure operational procedures. 8) Employ network segmentation and access controls to limit the potential impact of compromised SAP components. These targeted actions go beyond generic advice by focusing on administrative control, monitoring, and integration of malware scanning specifically for the Migration Workbench file upload process.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:19.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870714bc3e00ba6f3bc6

Added to database: 11/11/2025, 12:44:55 AM

Last enriched: 11/18/2025, 4:46:57 AM

Last updated: 11/22/2025, 8:53:25 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats