Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42908: CWE-352: Cross-Site Request Forgery in SAP_SE SAP NetWeaver Application Server for ABAP

0
Medium
VulnerabilityCVE-2025-42908cvecve-2025-42908cwe-352
Published: Tue Oct 14 2025 (10/14/2025, 00:18:04 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server for ABAP

Description

CVE-2025-42908 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting SAP NetWeaver Application Server for ABAP versions including 7. 53, 7. 54, 7. 77, 7. 89, 7. 93, and 9. 16. An authenticated attacker can exploit this flaw to bypass the initial transaction screen and authorization checks by initiating transactions directly via the session manager. This enables unauthorized execution of actions and transactions that normally require specific permissions, compromising system confidentiality and integrity. The vulnerability does not impact system availability and requires the attacker to have valid user credentials.

AI-Powered Analysis

AILast updated: 10/21/2025, 11:58:15 UTC

Technical Analysis

CVE-2025-42908 is a Cross-Site Request Forgery (CSRF) vulnerability identified in SAP NetWeaver Application Server for ABAP, impacting multiple versions including 7.53 through 9.16. The vulnerability arises because the session manager allows an authenticated attacker to initiate transactions directly, bypassing the first transaction screen and the associated authorization checks. This bypass means that an attacker with valid credentials can perform unauthorized actions or execute transactions that normally require specific permissions, effectively compromising the confidentiality and integrity of the system. The flaw does not affect availability, as it does not cause denial of service or system crashes. Exploitation requires the attacker to be authenticated, but no user interaction is needed beyond that. The vulnerability is classified under CWE-352, indicating a CSRF weakness where state-changing requests can be forged by attackers. Although no exploits have been reported in the wild yet, the vulnerability's presence in widely used SAP NetWeaver versions poses a significant risk to organizations relying on these systems for critical business operations. The CVSS v3.1 base score is 5.4, reflecting medium severity due to the ease of network exploitation, low attack complexity, and the requirement for privileges but no user interaction. The vulnerability highlights the importance of robust session and transaction management in enterprise applications to prevent unauthorized transaction execution. No patches were listed at the time of reporting, so organizations should monitor SAP advisories closely and apply updates promptly once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive business data and processes managed through SAP NetWeaver Application Server for ABAP. Unauthorized transaction execution could lead to data manipulation, unauthorized financial transactions, or exposure of confidential information. Given SAP's widespread use in critical sectors such as manufacturing, finance, utilities, and government across Europe, exploitation could disrupt business operations and damage trust. Although availability is not impacted, the breach of authorization controls undermines compliance with data protection regulations like GDPR, potentially leading to legal and financial penalties. The requirement for attacker authentication limits exposure to insider threats or compromised credentials but does not eliminate risk, especially in environments with weak credential management or phishing vulnerabilities. The absence of known exploits currently provides a window for proactive mitigation, but organizations should act swiftly to prevent potential targeted attacks. The impact is particularly acute for organizations with complex SAP landscapes and high-value transactions, where unauthorized actions could have cascading operational and reputational consequences.

Mitigation Recommendations

1. Monitor SAP Security Advisories closely and apply official patches or updates as soon as they become available for the affected SAP NetWeaver versions. 2. Implement strict session management controls, including session timeouts and re-authentication for sensitive transactions, to reduce the risk of session hijacking or misuse. 3. Deploy anti-CSRF tokens on all transaction forms and validate them server-side to ensure requests originate from legitimate user sessions. 4. Enforce the principle of least privilege by reviewing and tightening user permissions within SAP to minimize the potential impact of compromised accounts. 5. Conduct regular security awareness training focused on credential protection and phishing prevention to reduce the risk of attacker authentication. 6. Utilize SAP’s security audit logs and monitoring tools to detect unusual transaction patterns or unauthorized access attempts promptly. 7. Consider implementing multi-factor authentication (MFA) for SAP user logins to add an additional layer of defense against credential compromise. 8. Review and harden network segmentation and access controls to limit exposure of SAP systems to only trusted internal networks and users. 9. Test and validate all mitigations in a controlled environment before deployment to ensure they do not disrupt legitimate business processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b46

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 10/21/2025, 11:58:15 AM

Last updated: 12/3/2025, 10:11:51 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats