Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42894: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP Business Connector

0
Medium
VulnerabilityCVE-2025-42894cvecve-2025-42894cwe-22
Published: Tue Nov 11 2025 (11/11/2025, 00:19:22 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Business Connector

Description

Due to a Path Traversal vulnerability in SAP Business Connector, an attacker authenticated as an administrator with adjacent access could read, write, overwrite, and delete arbitrary files on the host system. Successful exploitation could enable the attacker to execute arbitrary operating system commands on the server, resulting in a complete compromise of the confidentiality, integrity, and availability of the affected system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:03:26 UTC

Technical Analysis

CVE-2025-42894 is a path traversal vulnerability identified in SAP Business Connector version 4.8, a middleware product used to integrate SAP systems with external applications. The vulnerability is classified under CWE-22, indicating improper limitation of a pathname to a restricted directory. An attacker who is authenticated as an administrator and has adjacent network access can exploit this flaw to manipulate file paths, enabling them to read, write, overwrite, or delete arbitrary files on the host operating system. This capability can be leveraged to execute arbitrary operating system commands, effectively allowing the attacker to gain full control over the affected system. The vulnerability does not require user interaction beyond authentication, and the attack surface is limited to those with administrative privileges and network adjacency, reducing the ease of exploitation. The CVSS v3.1 base score is 6.8, reflecting a medium severity level with high impact on confidentiality, integrity, and availability but limited by the attack vector and privilege requirements. No patches or known exploits are currently publicly available, but the risk of exploitation remains significant due to the potential for complete system compromise.

Potential Impact

The impact of CVE-2025-42894 is substantial for organizations using SAP Business Connector 4.8. Successful exploitation compromises the confidentiality, integrity, and availability of the host system, potentially leading to data breaches, unauthorized data modification, and service disruption. Given SAP Business Connector's role in integrating critical business processes, attackers could leverage this vulnerability to pivot within internal networks, escalate privileges, or disrupt enterprise operations. The requirement for administrative authentication and adjacent network access limits the scope but does not eliminate risk, especially in environments with weak internal segmentation or compromised credentials. Organizations in sectors such as manufacturing, finance, utilities, and government that rely heavily on SAP infrastructure could face operational downtime, regulatory penalties, and reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2025-42894, organizations should implement the following specific measures: 1) Apply vendor patches promptly once released by SAP to address the path traversal vulnerability. 2) Restrict administrative access to SAP Business Connector to trusted hosts and networks using network segmentation and firewall rules to limit adjacent network exposure. 3) Enforce strong authentication mechanisms and monitor administrative account usage for anomalous activity. 4) Conduct regular file integrity monitoring on systems running SAP Business Connector to detect unauthorized file changes. 5) Employ application-layer controls to validate and sanitize file path inputs within SAP Business Connector configurations or custom integrations. 6) Implement comprehensive logging and alerting to detect attempts to exploit path traversal or execute unauthorized commands. 7) Review and harden operating system permissions to limit the impact of potential file system manipulations. These targeted actions go beyond generic advice by focusing on reducing attack surface and early detection in the context of this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:22.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3bf8

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 2/27/2026, 2:03:26 AM

Last updated: 3/25/2026, 4:39:54 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses