CVE-2025-42901: CWE-94: Improper Control of Generation of Code in SAP_SE SAP Application Server for ABAP (BAPI Browser)
CVE-2025-42901 is a medium-severity vulnerability in SAP Application Server for ABAP's BAPI Browser that allows authenticated attackers to store malicious JavaScript payloads. These payloads can execute in the browsers of users accessing the affected BAPI explorer functionality, potentially compromising confidentiality and integrity. The vulnerability does not impact availability and requires attacker authentication but no user interaction. It affects multiple SAP_BASIS versions from 700 through 816. No known exploits are currently reported in the wild. The CVSS score is 5. 4, reflecting moderate risk due to ease of exploitation and limited impact scope. European organizations using affected SAP versions should prioritize patching and implement strict access controls and input validation to mitigate risks. Countries with significant SAP deployments and critical industries relying on SAP ERP systems are most at risk.
AI Analysis
Technical Summary
CVE-2025-42901 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting the SAP Application Server for ABAP, specifically the BAPI Browser component. This flaw allows an authenticated attacker to inject and store malicious JavaScript payloads within the BAPI explorer interface. When a legitimate user accesses the compromised functionality, the stored script executes in their browser context, leading to potential cross-site scripting (XSS) attacks. The vulnerability arises from insufficient sanitization or validation of user-supplied input that is later rendered in the browser without proper encoding or filtering. The attack vector requires the attacker to have valid credentials (low privilege) but does not require further user interaction to trigger the payload. The impact primarily concerns confidentiality and integrity, as the attacker could steal session tokens, manipulate displayed data, or perform unauthorized actions on behalf of the victim user. Availability is not affected. The vulnerability affects a wide range of SAP_BASIS versions from 700 to 816, indicating a long-standing issue across multiple SAP releases. The CVSS 3.1 base score of 5.4 reflects a medium severity due to network attack vector, low attack complexity, required privileges, and no user interaction. No public exploits have been reported yet, but the presence of stored XSS in a critical enterprise application poses a significant risk if weaponized. SAP has not yet published patches or mitigations at the time of this report.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of SAP ERP data and user sessions. Exploitation could lead to session hijacking, unauthorized data manipulation, or phishing attacks leveraging the trusted SAP interface. Given SAP's widespread use in European industries such as manufacturing, finance, utilities, and public sector, successful exploitation could disrupt business processes and lead to data breaches. Although availability is unaffected, the loss of data integrity and confidentiality could result in regulatory non-compliance, reputational damage, and financial losses. The requirement for attacker authentication limits exposure but insider threats or compromised credentials could be leveraged. Organizations with extensive SAP landscapes and remote access to SAP portals are particularly vulnerable. The lack of known exploits currently reduces immediate risk but proactive remediation is critical to prevent future attacks.
Mitigation Recommendations
1. Apply SAP security patches immediately once available for the affected SAP_BASIS versions to remediate the vulnerability. 2. Enforce strict access controls and least privilege principles for SAP user accounts to reduce the risk of attacker authentication. 3. Implement multi-factor authentication (MFA) for SAP access to mitigate credential compromise risks. 4. Conduct thorough input validation and output encoding in custom SAP developments and extensions to prevent injection of malicious scripts. 5. Monitor SAP logs and user activities for unusual behavior indicative of exploitation attempts. 6. Educate SAP users about phishing and social engineering risks to reduce the likelihood of credential theft. 7. Restrict browser-based access to SAP BAPI explorer functionality to trusted networks or VPNs to limit exposure. 8. Use web application firewalls (WAF) with rules targeting XSS payloads in SAP web interfaces. 9. Regularly review and update SAP security configurations and perform vulnerability assessments. 10. Coordinate with SAP support and security advisories for updates and best practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-42901: CWE-94: Improper Control of Generation of Code in SAP_SE SAP Application Server for ABAP (BAPI Browser)
Description
CVE-2025-42901 is a medium-severity vulnerability in SAP Application Server for ABAP's BAPI Browser that allows authenticated attackers to store malicious JavaScript payloads. These payloads can execute in the browsers of users accessing the affected BAPI explorer functionality, potentially compromising confidentiality and integrity. The vulnerability does not impact availability and requires attacker authentication but no user interaction. It affects multiple SAP_BASIS versions from 700 through 816. No known exploits are currently reported in the wild. The CVSS score is 5. 4, reflecting moderate risk due to ease of exploitation and limited impact scope. European organizations using affected SAP versions should prioritize patching and implement strict access controls and input validation to mitigate risks. Countries with significant SAP deployments and critical industries relying on SAP ERP systems are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-42901 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting the SAP Application Server for ABAP, specifically the BAPI Browser component. This flaw allows an authenticated attacker to inject and store malicious JavaScript payloads within the BAPI explorer interface. When a legitimate user accesses the compromised functionality, the stored script executes in their browser context, leading to potential cross-site scripting (XSS) attacks. The vulnerability arises from insufficient sanitization or validation of user-supplied input that is later rendered in the browser without proper encoding or filtering. The attack vector requires the attacker to have valid credentials (low privilege) but does not require further user interaction to trigger the payload. The impact primarily concerns confidentiality and integrity, as the attacker could steal session tokens, manipulate displayed data, or perform unauthorized actions on behalf of the victim user. Availability is not affected. The vulnerability affects a wide range of SAP_BASIS versions from 700 to 816, indicating a long-standing issue across multiple SAP releases. The CVSS 3.1 base score of 5.4 reflects a medium severity due to network attack vector, low attack complexity, required privileges, and no user interaction. No public exploits have been reported yet, but the presence of stored XSS in a critical enterprise application poses a significant risk if weaponized. SAP has not yet published patches or mitigations at the time of this report.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of SAP ERP data and user sessions. Exploitation could lead to session hijacking, unauthorized data manipulation, or phishing attacks leveraging the trusted SAP interface. Given SAP's widespread use in European industries such as manufacturing, finance, utilities, and public sector, successful exploitation could disrupt business processes and lead to data breaches. Although availability is unaffected, the loss of data integrity and confidentiality could result in regulatory non-compliance, reputational damage, and financial losses. The requirement for attacker authentication limits exposure but insider threats or compromised credentials could be leveraged. Organizations with extensive SAP landscapes and remote access to SAP portals are particularly vulnerable. The lack of known exploits currently reduces immediate risk but proactive remediation is critical to prevent future attacks.
Mitigation Recommendations
1. Apply SAP security patches immediately once available for the affected SAP_BASIS versions to remediate the vulnerability. 2. Enforce strict access controls and least privilege principles for SAP user accounts to reduce the risk of attacker authentication. 3. Implement multi-factor authentication (MFA) for SAP access to mitigate credential compromise risks. 4. Conduct thorough input validation and output encoding in custom SAP developments and extensions to prevent injection of malicious scripts. 5. Monitor SAP logs and user activities for unusual behavior indicative of exploitation attempts. 6. Educate SAP users about phishing and social engineering risks to reduce the likelihood of credential theft. 7. Restrict browser-based access to SAP BAPI explorer functionality to trusted networks or VPNs to limit exposure. 8. Use web application firewalls (WAF) with rules targeting XSS payloads in SAP web interfaces. 9. Regularly review and update SAP security configurations and perform vulnerability assessments. 10. Coordinate with SAP support and security advisories for updates and best practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:25.736Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ed9e3ae121319cf76b7b36
Added to database: 10/14/2025, 12:50:02 AM
Last enriched: 10/21/2025, 12:00:33 PM
Last updated: 12/4/2025, 6:07:49 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63363: n/a
UnknownCVE-2025-14012: SQL Injection in JIZHICMS
MediumCVE-2025-14011: SQL Injection in JIZHICMS
MediumCVE-2025-66373: n/a
UnknownCVE-2025-66287: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Red Hat Red Hat Enterprise Linux 6
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.