Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42891: CWE-862: Missing Authorization in SAP_SE SAP Enterprise Search for ABAP

0
Medium
VulnerabilityCVE-2025-42891cvecve-2025-42891cwe-862
Published: Tue Dec 09 2025 (12/09/2025, 02:15:18 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Enterprise Search for ABAP

Description

Due to a missing authorization check in SAP Enterprise Search for ABAP, an attacker with high privileges may read and export the contents of database tables into an ABAP report. This could lead to a high impact on data confidentiality and a low impact on data integrity. There is no impact on application's availability.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:51:07 UTC

Technical Analysis

CVE-2025-42891 is a vulnerability identified in SAP Enterprise Search for ABAP, specifically due to a missing authorization check (CWE-862). This flaw allows an attacker who already possesses high-level privileges within the SAP environment to read and export the contents of database tables by generating an ABAP report. The vulnerability affects multiple SAP_BASIS versions ranging from 7.52 to 8.16, which are widely used in enterprise SAP deployments. The core issue is the absence of proper authorization validation before allowing access to sensitive data through the search functionality, enabling unauthorized data extraction. While the vulnerability does not impact system availability, it poses a high risk to data confidentiality and a lower risk to data integrity, as attackers can access and export sensitive information but cannot modify it. Exploitation requires network access and elevated privileges but no user interaction, making it a concern primarily for insider threats or compromised privileged accounts. No public exploits have been reported yet, but the medium CVSS score of 5.5 reflects the significant confidentiality impact balanced by the requirement for high privileges. SAP has not yet published patches for this issue, so organizations must rely on compensating controls until updates are available.

Potential Impact

For European organizations, this vulnerability presents a significant risk to the confidentiality of sensitive business and personal data stored within SAP systems. Given SAP's widespread use in critical sectors such as manufacturing, finance, healthcare, and public administration across Europe, unauthorized data disclosure could lead to regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial losses. The integrity impact is lower but still relevant, as attackers could potentially influence reporting by exporting data, though no direct modification is indicated. The lack of availability impact means business continuity is less likely to be affected. However, the requirement for high privileges means that the threat is more likely to arise from insider threats or attackers who have already compromised privileged accounts. European organizations with complex SAP landscapes and insufficient privilege management or monitoring are particularly vulnerable to exploitation.

Mitigation Recommendations

1. Apply SAP security patches promptly once they are released for the affected SAP_BASIS versions to address the missing authorization check. 2. Implement strict role-based access controls (RBAC) to limit high privilege accounts only to essential personnel and regularly review these privileges. 3. Monitor and audit ABAP report generation and data export activities for unusual patterns or unauthorized access attempts. 4. Employ SAP Security Notes and tools such as SAP Enterprise Threat Detection to identify suspicious behavior related to SAP Enterprise Search usage. 5. Enforce network segmentation and strong authentication mechanisms to reduce the risk of privilege escalation and lateral movement within SAP environments. 6. Conduct regular security awareness training for SAP administrators and users with elevated privileges to reduce insider threat risks. 7. Use SAP’s standard authorization concepts to enforce granular access control on database tables and search functionalities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:22.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96d4

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:51:07 AM

Last updated: 12/10/2025, 9:20:01 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats