Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42896: CWE-116: Improper Encoding or Escaping of Output in SAP_SE SAP BusinessObjects Business Intelligence Platform

0
Medium
VulnerabilityCVE-2025-42896cvecve-2025-42896cwe-116
Published: Tue Dec 09 2025 (12/09/2025, 02:15:28 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP BusinessObjects Business Intelligence Platform

Description

SAP BusinessObjects Business Intelligence Platform lets an unauthenticated remote attacker send crafted requests through the URL parameter that controls the login page error message. This can cause the server to fetch attacker-supplied URLs, resulting in low impact to confidentiality and integrity, and no impact to availability.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:50:55 UTC

Technical Analysis

CVE-2025-42896 is a vulnerability classified under CWE-116, which involves improper encoding or escaping of output in the SAP BusinessObjects Business Intelligence Platform. The flaw exists in the handling of a URL parameter controlling the login page error message. An unauthenticated remote attacker can craft a malicious URL parameter that causes the server to fetch resources from attacker-controlled URLs. This behavior arises because the platform fails to properly encode or escape the output, allowing injection of external URLs into server-side requests. The impact is limited to confidentiality and integrity, as the server may leak information or perform unintended fetches, but availability remains unaffected. The vulnerability affects versions ENTERPRISE 430, 2025, and 2027 of the SAP BusinessObjects platform. The CVSS v3.1 base score is 5.4, indicating medium severity, with attack vector being network-based, no privileges required, but user interaction is necessary. No public exploits have been reported, and no patches are currently available, though SAP has published the advisory. The vulnerability could be leveraged to conduct phishing or reconnaissance by forcing the server to interact with attacker-controlled infrastructure, potentially exposing sensitive data or enabling further attacks.

Potential Impact

For European organizations, the vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers could exploit this flaw to cause the SAP BusinessObjects server to fetch malicious or attacker-controlled URLs, potentially leading to information disclosure or manipulation of data returned to users. Although availability is not impacted, the unauthorized external requests could be used as a vector for further attacks such as data exfiltration or lateral movement within the network. Organizations relying heavily on SAP BusinessObjects for business intelligence and reporting may face risks of sensitive business data exposure. The lack of authentication requirement increases the attack surface, especially for externally accessible SAP portals. Given SAP's widespread use in Europe, particularly in Germany, France, and the UK, the impact could be significant if exploited at scale. However, the requirement for user interaction reduces the likelihood of automated mass exploitation.

Mitigation Recommendations

1. Monitor and restrict outbound HTTP/HTTPS requests from SAP BusinessObjects servers to prevent unauthorized external URL fetches. 2. Implement network-level controls such as web proxies or firewalls to block suspicious or unknown external destinations. 3. Apply strict input validation and output encoding on URL parameters, especially those controlling error messages or redirects, as a temporary workaround if possible. 4. Educate users about phishing risks and suspicious links that could trigger the vulnerability. 5. Regularly audit SAP BusinessObjects logs for unusual activity or unexpected external requests. 6. Stay alert for SAP patches or security advisories addressing this vulnerability and apply them promptly once released. 7. Consider isolating SAP BusinessObjects servers from direct internet access or placing them behind secure gateways. 8. Employ web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:22.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69378a890af42da4c56f96d8

Added to database: 12/9/2025, 2:33:45 AM

Last enriched: 12/9/2025, 2:50:55 AM

Last updated: 12/10/2025, 10:56:14 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats