CVE-2025-42907: CWE-918: Server-Side Request Forgery in SAP_SE SAP BI Platform
SAP BI Platform allows an attacker to modify the IP address of the LogonToken for the OpenDoc. On accessing the modified link in the browser a different server could get the ping request. This has low impact on integrity with no impact on confidentiality and availability of the system.
AI Analysis
Technical Summary
CVE-2025-42907 is a Server-Side Request Forgery (SSRF) vulnerability identified in the SAP BI Platform, specifically affecting versions ENTERPRISE 430, 2025, and 2027. The vulnerability allows an attacker with some level of privileges (PR:L - privileges required) to manipulate the IP address embedded within the LogonToken used by the OpenDoc feature. By modifying this IP address, the attacker can cause the system to send a ping request to an arbitrary server when the crafted OpenDoc link is accessed in a browser. This behavior essentially enables the attacker to coerce the SAP BI Platform server to initiate network requests to unintended destinations. The vulnerability is classified under CWE-918 (Server-Side Request Forgery), which typically involves an attacker causing a server to make HTTP or other network requests to arbitrary locations. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts integrity but not confidentiality or availability. There are no known exploits in the wild, and no patches have been linked yet. The impact is limited primarily to integrity, as the attacker can influence network requests originating from the server, potentially enabling indirect reconnaissance or interaction with internal or external systems. However, the vulnerability does not allow direct data disclosure or denial of service. Given the nature of SAP BI Platform as a business intelligence and reporting tool widely used in enterprise environments, this SSRF could be leveraged as part of a larger attack chain, for example, to probe internal networks or bypass firewall restrictions by making the server act as a proxy. However, the requirement for some level of privileges limits the attack surface to authenticated or authorized users. Overall, this vulnerability represents a moderate risk that should be addressed promptly to prevent potential misuse in complex attack scenarios.
Potential Impact
For European organizations, the impact of CVE-2025-42907 is primarily related to the integrity of network communications initiated by the SAP BI Platform server. While confidentiality and availability are not directly affected, the ability to manipulate server-originated requests could facilitate internal network reconnaissance or interaction with protected resources, potentially aiding lateral movement or data exfiltration in multi-stage attacks. Organizations relying heavily on SAP BI Platform for critical business intelligence and reporting functions may face risks if attackers exploit this SSRF to pivot within their internal networks or to access internal services that are otherwise inaccessible externally. Given the medium CVSS score and the need for privileges, the threat is more relevant to insiders or attackers who have already gained some foothold. European enterprises in sectors such as finance, manufacturing, and public administration, which commonly deploy SAP solutions, could see targeted attempts to exploit this vulnerability. Additionally, regulatory frameworks like GDPR emphasize the protection of data integrity and system security, so even indirect impacts on system trustworthiness could have compliance implications. The lack of known exploits reduces immediate risk, but proactive mitigation is advisable to avoid potential escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Apply official patches or updates from SAP as soon as they become available for the affected SAP BI Platform versions (ENTERPRISE 430, 2025, 2027). 2. Restrict and monitor user privileges within SAP BI Platform to minimize the number of users with the ability to generate or modify OpenDoc links, thereby reducing the attack surface. 3. Implement network segmentation and firewall rules to limit the SAP BI Platform server's ability to initiate outbound requests to untrusted or unnecessary IP addresses, effectively containing potential SSRF exploitation. 4. Enable detailed logging and monitoring of OpenDoc link generation and access activities to detect anomalous modifications or unusual outbound network requests originating from the SAP BI Platform server. 5. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities within SAP environments to identify and remediate similar issues proactively. 6. Educate administrators and users about the risks of SSRF and the importance of safeguarding privileged access to SAP BI Platform features. 7. Consider deploying web application firewalls (WAFs) or network intrusion detection systems (NIDS) with rules tuned to detect and block suspicious SSRF-related traffic patterns involving SAP BI Platform.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-42907: CWE-918: Server-Side Request Forgery in SAP_SE SAP BI Platform
Description
SAP BI Platform allows an attacker to modify the IP address of the LogonToken for the OpenDoc. On accessing the modified link in the browser a different server could get the ping request. This has low impact on integrity with no impact on confidentiality and availability of the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-42907 is a Server-Side Request Forgery (SSRF) vulnerability identified in the SAP BI Platform, specifically affecting versions ENTERPRISE 430, 2025, and 2027. The vulnerability allows an attacker with some level of privileges (PR:L - privileges required) to manipulate the IP address embedded within the LogonToken used by the OpenDoc feature. By modifying this IP address, the attacker can cause the system to send a ping request to an arbitrary server when the crafted OpenDoc link is accessed in a browser. This behavior essentially enables the attacker to coerce the SAP BI Platform server to initiate network requests to unintended destinations. The vulnerability is classified under CWE-918 (Server-Side Request Forgery), which typically involves an attacker causing a server to make HTTP or other network requests to arbitrary locations. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network with low attack complexity, requires privileges but no user interaction, and impacts integrity but not confidentiality or availability. There are no known exploits in the wild, and no patches have been linked yet. The impact is limited primarily to integrity, as the attacker can influence network requests originating from the server, potentially enabling indirect reconnaissance or interaction with internal or external systems. However, the vulnerability does not allow direct data disclosure or denial of service. Given the nature of SAP BI Platform as a business intelligence and reporting tool widely used in enterprise environments, this SSRF could be leveraged as part of a larger attack chain, for example, to probe internal networks or bypass firewall restrictions by making the server act as a proxy. However, the requirement for some level of privileges limits the attack surface to authenticated or authorized users. Overall, this vulnerability represents a moderate risk that should be addressed promptly to prevent potential misuse in complex attack scenarios.
Potential Impact
For European organizations, the impact of CVE-2025-42907 is primarily related to the integrity of network communications initiated by the SAP BI Platform server. While confidentiality and availability are not directly affected, the ability to manipulate server-originated requests could facilitate internal network reconnaissance or interaction with protected resources, potentially aiding lateral movement or data exfiltration in multi-stage attacks. Organizations relying heavily on SAP BI Platform for critical business intelligence and reporting functions may face risks if attackers exploit this SSRF to pivot within their internal networks or to access internal services that are otherwise inaccessible externally. Given the medium CVSS score and the need for privileges, the threat is more relevant to insiders or attackers who have already gained some foothold. European enterprises in sectors such as finance, manufacturing, and public administration, which commonly deploy SAP solutions, could see targeted attempts to exploit this vulnerability. Additionally, regulatory frameworks like GDPR emphasize the protection of data integrity and system security, so even indirect impacts on system trustworthiness could have compliance implications. The lack of known exploits reduces immediate risk, but proactive mitigation is advisable to avoid potential escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Apply official patches or updates from SAP as soon as they become available for the affected SAP BI Platform versions (ENTERPRISE 430, 2025, 2027). 2. Restrict and monitor user privileges within SAP BI Platform to minimize the number of users with the ability to generate or modify OpenDoc links, thereby reducing the attack surface. 3. Implement network segmentation and firewall rules to limit the SAP BI Platform server's ability to initiate outbound requests to untrusted or unnecessary IP addresses, effectively containing potential SSRF exploitation. 4. Enable detailed logging and monitoring of OpenDoc link generation and access activities to detect anomalous modifications or unusual outbound network requests originating from the SAP BI Platform server. 5. Conduct regular security assessments and penetration testing focused on SSRF and related vulnerabilities within SAP environments to identify and remediate similar issues proactively. 6. Educate administrators and users about the risks of SSRF and the importance of safeguarding privileged access to SAP BI Platform features. 7. Consider deploying web application firewalls (WAFs) or network intrusion detection systems (NIDS) with rules tuned to detect and block suspicious SSRF-related traffic patterns involving SAP BI Platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:25.737Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d203c6efb46fd0305d3b23
Added to database: 9/23/2025, 2:19:50 AM
Last enriched: 9/23/2025, 2:34:36 AM
Last updated: 9/25/2025, 3:32:10 AM
Views: 13
Related Threats
CVE-2025-10963: Command Injection in Wavlink NU516U1
MediumCVE-2025-29156: n/a
HighCVE-2025-29157: n/a
MediumCVE-2025-10962: Command Injection in Wavlink NU516U1
MediumCVE-2025-10961: Command Injection in Wavlink NU516U1
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.