Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42887: CWE-94: Improper Control of Generation of Code in SAP_SE SAP Solution Manager

0
Critical
VulnerabilityCVE-2025-42887cvecve-2025-42887cwe-94
Published: Tue Nov 11 2025 (11/11/2025, 00:14:45 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Solution Manager

Description

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

AI-Powered Analysis

AILast updated: 11/18/2025, 04:47:39 UTC

Technical Analysis

CVE-2025-42887 is a critical security vulnerability identified in SAP Solution Manager version ST 720, classified under CWE-94 (Improper Control of Generation of Code). The root cause is the lack of proper input sanitation when handling calls to remote-enabled function modules. This flaw allows an authenticated attacker to inject and execute arbitrary malicious code within the SAP Solution Manager environment. Given that SAP Solution Manager is a centralized platform used for managing SAP landscapes, such exploitation can lead to complete system compromise, including unauthorized access to sensitive data, modification or deletion of critical information, and disruption of system availability. The vulnerability does not require user interaction but does require the attacker to have authenticated access, which could be obtained through compromised credentials or insider threat. The CVSS v3.1 base score of 9.9 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, privileges required, no user interaction, and scope change leading to high impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild yet, the severity and potential impact necessitate urgent attention. SAP Solution Manager's role in enterprise IT environments as a management and monitoring tool makes this vulnerability particularly dangerous, as attackers could leverage it to pivot into other systems or disrupt business-critical processes.

Potential Impact

For European organizations, the impact of CVE-2025-42887 is substantial due to the widespread use of SAP Solution Manager in enterprise environments across Europe. Successful exploitation could lead to unauthorized disclosure of sensitive corporate and customer data, manipulation of business processes, and potential downtime of critical IT infrastructure. This could result in financial losses, regulatory penalties under GDPR for data breaches, and reputational damage. The ability to execute arbitrary code remotely means attackers could deploy ransomware, steal intellectual property, or disrupt supply chains. Given the interconnected nature of European industries and critical infrastructure, a compromise in one organization could have cascading effects. The requirement for authenticated access somewhat limits the attack surface but does not eliminate risk, especially in environments with weak credential management or insufficient network segmentation. The criticality of SAP systems in sectors such as manufacturing, finance, energy, and public administration in Europe amplifies the threat's potential impact.

Mitigation Recommendations

1. Apply SAP's official security patches for Solution Manager ST 720 immediately upon release to remediate the vulnerability. 2. Enforce strict access controls and least privilege principles for all SAP Solution Manager users, ensuring only necessary personnel have authenticated access. 3. Implement multi-factor authentication (MFA) for all SAP Solution Manager accounts to reduce risk of credential compromise. 4. Monitor and audit remote-enabled function module calls for unusual or unauthorized activity using SAP's logging and monitoring tools. 5. Segment SAP Solution Manager systems from general IT networks to limit lateral movement in case of compromise. 6. Conduct regular security assessments and penetration testing focused on SAP environments to identify potential weaknesses. 7. Educate administrators and users about the risks of credential theft and social engineering attacks that could lead to unauthorized access. 8. Maintain up-to-date backups of SAP systems and configurations to enable rapid recovery in case of an incident. 9. Collaborate with SAP support and security communities to stay informed about emerging threats and mitigation strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:19.826Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870714bc3e00ba6f3bd6

Added to database: 11/11/2025, 12:44:55 AM

Last enriched: 11/18/2025, 4:47:39 AM

Last updated: 12/27/2025, 8:30:54 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats