CVE-2025-42891: CWE-862: Missing Authorization in SAP_SE SAP Enterprise Search for ABAP
Due to a missing authorization check in SAP Enterprise Search for ABAP, an attacker with high privileges may read and export the contents of database tables into an ABAP report. This could lead to a high impact on data confidentiality and a low impact on data integrity. There is no impact on application's availability.
AI Analysis
Technical Summary
CVE-2025-42891 is a vulnerability identified in SAP Enterprise Search for ABAP, specifically due to a missing authorization check (CWE-862). This flaw allows an attacker possessing high-level privileges within the SAP environment to bypass intended access controls and read or export the contents of database tables by generating ABAP reports. The vulnerability affects SAP_BASIS versions 752 through 816, which are widely deployed in enterprise environments. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and no user interaction (UI:N), but does require privileges (PR:H). The impact primarily compromises confidentiality (C:H) with a lesser effect on integrity (I:L), and no impact on availability (A:N). This means sensitive business data stored in SAP databases can be exposed or extracted without proper authorization checks, potentially leading to data breaches or leakage of proprietary information. Although no exploits are currently known in the wild, the vulnerability's presence in critical SAP components necessitates prompt attention. The vulnerability does not disrupt system operations but undermines trust in data security and compliance. SAP has not yet released patches, so organizations must rely on compensating controls until updates are available.
Potential Impact
For European organizations, the impact of CVE-2025-42891 is significant due to the widespread use of SAP ERP systems across industries such as manufacturing, finance, utilities, and public sector. The ability for an attacker with high privileges to export sensitive database contents threatens confidentiality of critical business data, intellectual property, and personal data protected under GDPR. This could lead to regulatory penalties, reputational damage, and financial losses. Although integrity impact is low, unauthorized data exports can facilitate further attacks or insider threats. Availability is unaffected, so operational disruption is unlikely. However, the breach of confidentiality alone can have severe consequences, especially for organizations handling sensitive customer or strategic data. The requirement for high privileges limits exploitation to insiders or compromised accounts, but this does not eliminate risk given the complexity of SAP environments and potential privilege escalations. Organizations in sectors with strict data protection requirements or those targeted by advanced persistent threats (APTs) must prioritize addressing this vulnerability.
Mitigation Recommendations
1. Monitor and restrict SAP user privileges rigorously, ensuring that only trusted administrators have high-level access to SAP_BASIS components and Enterprise Search functionalities. 2. Implement strict segregation of duties to minimize the risk of privilege abuse. 3. Audit ABAP report generation logs regularly to detect unusual or unauthorized data export activities. 4. Apply SAP security notes and patches promptly once released for the affected SAP_BASIS versions. 5. Employ SAP’s standard authorization concepts to enforce granular access controls on Enterprise Search and database tables. 6. Use SAP’s Security Audit Log and System Change Logging to track changes and access attempts related to Enterprise Search. 7. Consider deploying additional data loss prevention (DLP) solutions integrated with SAP to detect and block unauthorized data exports. 8. Conduct regular security assessments and penetration tests focusing on SAP authorization configurations. 9. Educate SAP administrators and users about the risks of privilege misuse and the importance of secure configuration. 10. If patching is delayed, consider temporary disabling or restricting Enterprise Search features that allow report exports until a fix is applied.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-42891: CWE-862: Missing Authorization in SAP_SE SAP Enterprise Search for ABAP
Description
Due to a missing authorization check in SAP Enterprise Search for ABAP, an attacker with high privileges may read and export the contents of database tables into an ABAP report. This could lead to a high impact on data confidentiality and a low impact on data integrity. There is no impact on application's availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-42891 is a vulnerability identified in SAP Enterprise Search for ABAP, specifically due to a missing authorization check (CWE-862). This flaw allows an attacker possessing high-level privileges within the SAP environment to bypass intended access controls and read or export the contents of database tables by generating ABAP reports. The vulnerability affects SAP_BASIS versions 752 through 816, which are widely deployed in enterprise environments. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and no user interaction (UI:N), but does require privileges (PR:H). The impact primarily compromises confidentiality (C:H) with a lesser effect on integrity (I:L), and no impact on availability (A:N). This means sensitive business data stored in SAP databases can be exposed or extracted without proper authorization checks, potentially leading to data breaches or leakage of proprietary information. Although no exploits are currently known in the wild, the vulnerability's presence in critical SAP components necessitates prompt attention. The vulnerability does not disrupt system operations but undermines trust in data security and compliance. SAP has not yet released patches, so organizations must rely on compensating controls until updates are available.
Potential Impact
For European organizations, the impact of CVE-2025-42891 is significant due to the widespread use of SAP ERP systems across industries such as manufacturing, finance, utilities, and public sector. The ability for an attacker with high privileges to export sensitive database contents threatens confidentiality of critical business data, intellectual property, and personal data protected under GDPR. This could lead to regulatory penalties, reputational damage, and financial losses. Although integrity impact is low, unauthorized data exports can facilitate further attacks or insider threats. Availability is unaffected, so operational disruption is unlikely. However, the breach of confidentiality alone can have severe consequences, especially for organizations handling sensitive customer or strategic data. The requirement for high privileges limits exploitation to insiders or compromised accounts, but this does not eliminate risk given the complexity of SAP environments and potential privilege escalations. Organizations in sectors with strict data protection requirements or those targeted by advanced persistent threats (APTs) must prioritize addressing this vulnerability.
Mitigation Recommendations
1. Monitor and restrict SAP user privileges rigorously, ensuring that only trusted administrators have high-level access to SAP_BASIS components and Enterprise Search functionalities. 2. Implement strict segregation of duties to minimize the risk of privilege abuse. 3. Audit ABAP report generation logs regularly to detect unusual or unauthorized data export activities. 4. Apply SAP security notes and patches promptly once released for the affected SAP_BASIS versions. 5. Employ SAP’s standard authorization concepts to enforce granular access controls on Enterprise Search and database tables. 6. Use SAP’s Security Audit Log and System Change Logging to track changes and access attempts related to Enterprise Search. 7. Consider deploying additional data loss prevention (DLP) solutions integrated with SAP to detect and block unauthorized data exports. 8. Conduct regular security assessments and penetration tests focusing on SAP authorization configurations. 9. Educate SAP administrators and users about the risks of privilege misuse and the importance of secure configuration. 10. If patching is delayed, consider temporary disabling or restricting Enterprise Search features that allow report exports until a fix is applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:22.788Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69378a890af42da4c56f96d4
Added to database: 12/9/2025, 2:33:45 AM
Last enriched: 12/16/2025, 5:04:29 AM
Last updated: 2/4/2026, 7:25:58 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25140: CWE-400: Uncontrolled Resource Consumption in chainguard-dev apko
HighCVE-2026-25122: CWE-400: Uncontrolled Resource Consumption in chainguard-dev apko
MediumCVE-2026-25121: CWE-23: Relative Path Traversal in chainguard-dev apko
HighCVE-2026-0536: CWE-787 Out-of-bounds Write in Autodesk 3ds Max
HighCVE-2024-42642: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.