Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management

0
Critical
VulnerabilityCVE-2025-42910cvecve-2025-42910cwe-434
Published: Tue Oct 14 2025 (10/14/2025, 00:18:21 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Supplier Relationship Management

Description

Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:03:43 UTC

Technical Analysis

CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is the lack of proper verification of file types or content during file uploads, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). An authenticated attacker can exploit this flaw to upload arbitrary files, including potentially malicious executables. These files could then be downloaded and executed by users, facilitating malware deployment or further compromise. The vulnerability affects the confidentiality, integrity, and availability of the SAP SRM application, as attackers may gain unauthorized access, modify data, or disrupt services. The CVSS v3.1 base score is 9.0 (critical), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating network attack vector, low attack complexity, requiring low privileges and user interaction, with a scope change and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's severity and the critical role of SAP SRM in supply chain and procurement processes make it a high-risk issue. SAP has not yet released patches, so organizations must apply compensating controls to reduce exposure.

Potential Impact

The impact of CVE-2025-42910 is significant for organizations relying on SAP Supplier Relationship Management for procurement and supply chain operations. Successful exploitation can lead to unauthorized execution of malicious code, resulting in data breaches, manipulation of procurement data, disruption of supply chain workflows, and potential spread of malware within enterprise networks. Confidential information such as supplier contracts, pricing, and internal communications could be exposed or altered, undermining business integrity and trust. Availability of the SRM system may be compromised, causing operational downtime and financial losses. Given SAP SRM's integration with other enterprise systems, the attack could cascade, affecting broader IT infrastructure. The requirement for authentication and user interaction somewhat limits exploitation but does not eliminate risk, especially in environments with many users or weak access controls. The absence of known exploits currently provides a window for mitigation before active attacks emerge.

Mitigation Recommendations

Organizations should implement multiple layers of defense to mitigate this vulnerability. Immediate steps include restricting file upload permissions to the minimum necessary users and enforcing strict access controls and authentication mechanisms. Deploy application-layer filtering to validate file types and content before upload, using allowlists for permitted file extensions and MIME types. Monitor file upload activity and scan uploaded files with advanced malware detection tools. Educate users about the risks of executing downloaded files from SAP SRM and enforce policies to prevent execution of untrusted files. Network segmentation can limit the impact of any compromise. Since no official patches are currently available, organizations should engage with SAP support for updates and advisories and prepare to apply patches promptly upon release. Regularly review and update incident response plans to address potential exploitation scenarios related to file upload vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b4e

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 2/27/2026, 2:03:43 AM

Last updated: 3/25/2026, 11:46:13 PM

Views: 472

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses