Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42894: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP Business Connector

0
Medium
VulnerabilityCVE-2025-42894cvecve-2025-42894cwe-22
Published: Tue Nov 11 2025 (11/11/2025, 00:19:22 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business Connector

Description

Due to a Path Traversal vulnerability in SAP Business Connector, an attacker authenticated as an administrator with adjacent access could read, write, overwrite, and delete arbitrary files on the host system. Successful exploitation could enable the attacker to execute arbitrary operating system commands on the server, resulting in a complete compromise of the confidentiality, integrity, and availability of the affected system.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:12:40 UTC

Technical Analysis

CVE-2025-42894 is a path traversal vulnerability classified under CWE-22 affecting SAP Business Connector version 4.8. This vulnerability arises from improper limitation of pathname inputs, allowing an attacker with administrator-level authentication and adjacent network access to manipulate file paths beyond intended directories. By exploiting this flaw, the attacker can read, write, overwrite, or delete arbitrary files on the underlying host system. Such file system manipulation can be leveraged to execute arbitrary operating system commands, effectively granting the attacker full control over the compromised server. The vulnerability does not require user interaction but does require high privileges (administrator) and adjacent network access, limiting the attack surface to trusted or internal networks. The CVSS 3.1 base score is 6.8, reflecting medium severity due to the combination of high impact on confidentiality, integrity, and availability, but mitigated by the requirement for privileged access and adjacency. No public exploits are currently known, but the potential for complete system compromise makes this a critical concern for organizations relying on SAP Business Connector 4.8. The vulnerability was published on November 11, 2025, and no patches were listed at the time of reporting, indicating that organizations must implement interim mitigations until official fixes are released.

Potential Impact

For European organizations, the impact of CVE-2025-42894 can be significant, especially for those using SAP Business Connector 4.8 in critical business processes or infrastructure. Successful exploitation could lead to unauthorized disclosure of sensitive data, modification or deletion of critical files, and disruption of business operations due to system compromise. The ability to execute arbitrary OS commands elevates the risk to full system takeover, potentially allowing attackers to move laterally within networks, deploy ransomware, or exfiltrate data. Given SAP's widespread use in European enterprises, including manufacturing, finance, and public sector entities, this vulnerability poses a threat to operational continuity and data protection compliance under regulations such as GDPR. The requirement for administrator privileges and adjacent network access somewhat limits remote exploitation but does not eliminate risk from insider threats or compromised internal accounts. Therefore, the vulnerability could facilitate insider attacks or lateral movement following initial compromise, amplifying its impact on confidentiality, integrity, and availability.

Mitigation Recommendations

To mitigate CVE-2025-42894, European organizations should implement the following specific measures: 1) Restrict administrative access to SAP Business Connector systems to trusted network segments only, using network segmentation and strict firewall rules to limit adjacent network exposure. 2) Enforce strong authentication and authorization controls for administrator accounts, including multi-factor authentication and regular privilege audits to reduce the risk of credential compromise. 3) Monitor file system integrity and access logs on SAP Business Connector hosts to detect unauthorized file operations indicative of exploitation attempts. 4) Apply SAP security advisories and patches promptly once available; until then, consider disabling or restricting vulnerable functionalities if feasible. 5) Conduct regular security assessments and penetration tests focusing on SAP environments to identify and remediate similar path traversal or privilege escalation issues. 6) Educate internal administrators about the risks of this vulnerability and the importance of safeguarding credentials and network access. These targeted actions go beyond generic advice by focusing on limiting attack vectors specific to the vulnerability's requirements and enhancing detection capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:22.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3bf8

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 12/11/2025, 9:12:40 PM

Last updated: 1/7/2026, 4:54:08 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats