Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42901: CWE-94: Improper Control of Generation of Code in SAP_SE SAP Application Server for ABAP (BAPI Browser)

0
Medium
VulnerabilityCVE-2025-42901cvecve-2025-42901cwe-94
Published: Tue Oct 14 2025 (10/14/2025, 00:17:23 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Application Server for ABAP (BAPI Browser)

Description

SAP Application Server for ABAP allows an authenticated attacker to store malicious JavaScript payloads which could be executed in victim user's browser when accessing the affected functionality of BAPI explorer. This has low impact on confidentiality and integrity with no impact on availability of the application.

AI-Powered Analysis

AILast updated: 10/14/2025, 01:06:27 UTC

Technical Analysis

CVE-2025-42901 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting the SAP Application Server for ABAP, specifically the BAPI Browser component. The flaw allows an authenticated attacker to inject and store malicious JavaScript code within the BAPI explorer interface. When legitimate users access this interface, the stored script executes in their browsers, resulting in a stored cross-site scripting (XSS) attack. This can lead to unauthorized disclosure of sensitive information (confidentiality impact) and potential manipulation of data or user sessions (integrity impact). The vulnerability does not affect system availability. The attacker must have valid credentials to exploit this issue, but no further user interaction (such as clicking a link) is required once the malicious code is stored. The vulnerability affects a wide range of SAP_BASIS versions from 700 to 816, indicating a long-standing and broadly deployed component is impacted. Despite the absence of known exploits in the wild, the vulnerability's presence in critical enterprise software necessitates attention. The CVSS 3.1 base score of 5.4 reflects a medium severity, with network attack vector, low attack complexity, and privileges required but no user interaction needed. The root cause is improper sanitization or validation of user input that allows malicious code to be stored and executed in a trusted context.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of data processed through SAP systems. Exploitation could allow attackers to steal session tokens, harvest user credentials, or manipulate displayed data within the SAP GUI accessed via browsers. This can lead to unauthorized access to sensitive business information, financial data, or intellectual property. While availability is not impacted, the breach of confidentiality and integrity can disrupt business operations and compliance with data protection regulations such as GDPR. Organizations in sectors heavily reliant on SAP ERP systems—such as manufacturing, finance, utilities, and government—may face increased risk. The need for attacker authentication limits exposure somewhat, but insider threats or compromised credentials could facilitate exploitation. The broad range of affected SAP_BASIS versions means many European enterprises running legacy or unpatched SAP environments are vulnerable. The absence of known exploits currently provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

European organizations should immediately assess their SAP Application Server for ABAP versions against the affected list (SAP_BASIS 700 through 816). Since no official patches are listed yet, organizations should implement compensating controls such as: 1) Restricting and monitoring access to the BAPI Browser functionality to trusted administrators only. 2) Enforcing strong authentication and session management policies to reduce risk of credential compromise. 3) Applying input validation and output encoding at the application layer where possible to prevent script injection. 4) Conducting regular security audits and code reviews of custom ABAP code interacting with BAPI explorer. 5) Educating users about the risks of stored XSS and encouraging cautious behavior when accessing SAP web interfaces. 6) Monitoring SAP logs and network traffic for unusual activity indicative of exploitation attempts. 7) Preparing to deploy vendor patches promptly once available. Additionally, organizations should consider isolating SAP web interfaces behind web application firewalls (WAFs) configured to detect and block XSS payloads. Maintaining up-to-date backups and incident response plans tailored to SAP environments will also aid in rapid recovery if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b36

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 10/14/2025, 1:06:27 AM

Last updated: 10/16/2025, 6:14:00 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats