Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42894: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP Business Connector

0
Medium
VulnerabilityCVE-2025-42894cvecve-2025-42894cwe-22
Published: Tue Nov 11 2025 (11/11/2025, 00:19:22 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business Connector

Description

Due to a Path Traversal vulnerability in SAP Business Connector, an attacker authenticated as an administrator with adjacent access could read, write, overwrite, and delete arbitrary files on the host system. Successful exploitation could enable the attacker to execute arbitrary operating system commands on the server, resulting in a complete compromise of the confidentiality, integrity, and availability of the affected system.

AI-Powered Analysis

AILast updated: 11/18/2025, 06:36:02 UTC

Technical Analysis

CVE-2025-42894 is a path traversal vulnerability classified under CWE-22 affecting SAP Business Connector version 4.8. This vulnerability arises from improper limitation of pathname inputs, allowing an attacker with administrator privileges and adjacent network access to manipulate file paths beyond intended directories. Specifically, the attacker can read, write, overwrite, or delete arbitrary files on the host system. Such file system manipulation can be leveraged to execute arbitrary operating system commands, effectively granting the attacker full control over the affected server. The vulnerability requires the attacker to be authenticated as an administrator, which limits exploitation to insiders or attackers who have already compromised administrative credentials. No user interaction is necessary, and the attack surface is limited to adjacent network access, meaning the attacker must be on the same or a connected network segment. The CVSS v3.1 base score is 6.8, reflecting a medium severity rating due to the high privileges required and the network adjacency constraint. Although no public exploits have been reported yet, the potential impact is severe, as successful exploitation compromises confidentiality, integrity, and availability of the system. SAP Business Connector is widely used in enterprise environments for integrating SAP systems with external applications, making this vulnerability particularly critical in environments where SAP is central to business operations. The lack of currently available patches necessitates immediate risk mitigation through access controls and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-42894 can be substantial. SAP Business Connector is commonly deployed in large enterprises and critical infrastructure sectors such as manufacturing, finance, utilities, and government agencies across Europe. Exploitation could lead to unauthorized disclosure of sensitive business data, manipulation or destruction of critical files, and full system compromise allowing attackers to disrupt business operations or move laterally within networks. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data breaches), reputational damage, and operational downtime. The requirement for administrative privileges reduces the likelihood of external exploitation but raises concerns about insider threats or attackers who have obtained elevated credentials through phishing or other means. The ability to execute arbitrary OS commands could also facilitate deployment of ransomware or other malware, amplifying the threat. Given the interconnected nature of European supply chains and critical infrastructure, a successful attack could have cascading effects beyond the initially compromised organization.

Mitigation Recommendations

1. Apply SAP-provided patches or updates as soon as they become available to address the vulnerability directly. 2. Restrict administrative access to SAP Business Connector systems using strong authentication methods, such as multi-factor authentication (MFA), and limit access to trusted personnel only. 3. Implement network segmentation and firewall rules to restrict adjacent network access to SAP Business Connector hosts, minimizing exposure to potential attackers. 4. Monitor file system integrity and audit logs for unusual file access or modifications indicative of exploitation attempts. 5. Conduct regular credential audits and enforce least privilege principles to reduce the risk of credential compromise. 6. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect suspicious activity related to path traversal or command execution attempts. 7. Educate administrators on the risks of credential theft and enforce secure password policies. 8. Consider deploying application-layer protections or web application firewalls (WAF) that can detect and block path traversal attempts if applicable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:22.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3bf8

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 11/18/2025, 6:36:02 AM

Last updated: 11/22/2025, 3:17:51 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats