CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management
Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.
AI Analysis
Technical Summary
CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is a lack of proper validation on uploaded files, specifically the absence of verification for file type or content, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This allows an authenticated attacker to upload arbitrary files, including potentially malicious executables. Once uploaded, these files could be downloaded and executed by users, leading to the execution of malware within the trusted environment of the SAP SRM application. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, data theft, or service disruption. The CVSS v3.1 score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable with low attack complexity, requiring low privileges and user interaction, but with a scope change affecting multiple components. Although no exploits have been observed in the wild yet, the critical nature of SAP SRM in managing supplier relationships and procurement processes makes this vulnerability a significant risk. The lack of patch links suggests that SAP may not have released an official fix at the time of publication, emphasizing the need for immediate compensating controls. The vulnerability could be leveraged to implant malware, disrupt supply chain operations, or exfiltrate sensitive business data, potentially causing severe operational and reputational damage.
Potential Impact
For European organizations, the impact of CVE-2025-42910 is substantial due to the widespread use of SAP SRM in managing supplier relationships, procurement, and supply chain logistics. Exploitation could lead to unauthorized access to sensitive supplier and procurement data, manipulation of purchase orders, and disruption of supply chain operations, which are critical for manufacturing, retail, and public sector entities. The confidentiality breach could expose business secrets and supplier contracts, while integrity violations might result in fraudulent transactions or altered procurement records. Availability impacts could cause downtime in procurement processes, delaying critical supplies and affecting business continuity. Given Europe's reliance on complex supply chains and regulatory requirements such as GDPR, a compromise could also lead to legal and compliance repercussions. The vulnerability's requirement for authentication and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with weak access controls or insider threats. The potential for malware deployment further raises concerns about lateral movement within enterprise networks and persistent threats targeting European organizations’ critical infrastructure.
Mitigation Recommendations
To mitigate CVE-2025-42910, European organizations should implement a multi-layered approach beyond generic patching advice. First, immediately verify if SAP has released patches or security notes addressing this vulnerability and apply them as a priority. In the absence of official patches, enforce strict file upload restrictions by configuring SAP SRM to allow only safe file types and implement content scanning using antivirus and malware detection tools on uploaded files. Employ application-layer firewalls or web application firewalls (WAFs) to monitor and block suspicious upload attempts. Strengthen authentication mechanisms by enforcing multi-factor authentication (MFA) and reviewing user privileges to ensure least privilege principles are applied, minimizing the number of users who can upload files. Conduct regular audits of uploaded files and monitor logs for unusual activity related to file uploads and downloads. Educate users about the risks of executing downloaded files from SAP SRM and establish policies to prevent execution of untrusted files. Additionally, segment the SAP SRM environment from other critical systems to limit lateral movement in case of compromise. Finally, maintain up-to-date backups and incident response plans tailored to supply chain disruptions.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Belgium, Sweden
CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management
Description
Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is a lack of proper validation on uploaded files, specifically the absence of verification for file type or content, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This allows an authenticated attacker to upload arbitrary files, including potentially malicious executables. Once uploaded, these files could be downloaded and executed by users, leading to the execution of malware within the trusted environment of the SAP SRM application. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, data theft, or service disruption. The CVSS v3.1 score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable with low attack complexity, requiring low privileges and user interaction, but with a scope change affecting multiple components. Although no exploits have been observed in the wild yet, the critical nature of SAP SRM in managing supplier relationships and procurement processes makes this vulnerability a significant risk. The lack of patch links suggests that SAP may not have released an official fix at the time of publication, emphasizing the need for immediate compensating controls. The vulnerability could be leveraged to implant malware, disrupt supply chain operations, or exfiltrate sensitive business data, potentially causing severe operational and reputational damage.
Potential Impact
For European organizations, the impact of CVE-2025-42910 is substantial due to the widespread use of SAP SRM in managing supplier relationships, procurement, and supply chain logistics. Exploitation could lead to unauthorized access to sensitive supplier and procurement data, manipulation of purchase orders, and disruption of supply chain operations, which are critical for manufacturing, retail, and public sector entities. The confidentiality breach could expose business secrets and supplier contracts, while integrity violations might result in fraudulent transactions or altered procurement records. Availability impacts could cause downtime in procurement processes, delaying critical supplies and affecting business continuity. Given Europe's reliance on complex supply chains and regulatory requirements such as GDPR, a compromise could also lead to legal and compliance repercussions. The vulnerability's requirement for authentication and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with weak access controls or insider threats. The potential for malware deployment further raises concerns about lateral movement within enterprise networks and persistent threats targeting European organizations’ critical infrastructure.
Mitigation Recommendations
To mitigate CVE-2025-42910, European organizations should implement a multi-layered approach beyond generic patching advice. First, immediately verify if SAP has released patches or security notes addressing this vulnerability and apply them as a priority. In the absence of official patches, enforce strict file upload restrictions by configuring SAP SRM to allow only safe file types and implement content scanning using antivirus and malware detection tools on uploaded files. Employ application-layer firewalls or web application firewalls (WAFs) to monitor and block suspicious upload attempts. Strengthen authentication mechanisms by enforcing multi-factor authentication (MFA) and reviewing user privileges to ensure least privilege principles are applied, minimizing the number of users who can upload files. Conduct regular audits of uploaded files and monitor logs for unusual activity related to file uploads and downloads. Educate users about the risks of executing downloaded files from SAP SRM and establish policies to prevent execution of untrusted files. Additionally, segment the SAP SRM environment from other critical systems to limit lateral movement in case of compromise. Finally, maintain up-to-date backups and incident response plans tailored to supply chain disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:25.737Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ed9e3ae121319cf76b7b4e
Added to database: 10/14/2025, 12:50:02 AM
Last enriched: 10/14/2025, 1:05:00 AM
Last updated: 10/14/2025, 5:07:44 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
Critical⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
CriticalCVE-2025-42939: CWE-863: Incorrect Authorization in SAP_SE SAP S/4HANA (Manage Processing Rules - For Bank Statements)
MediumCVE-2025-42937: CWE-35: Path Traversal in SAP_SE SAP Print Service
CriticalCVE-2025-42909: CWE-1004: Sensitive Cookie Without HttpOnly Flag in SAP_SE SAP Cloud Appliance Library Appliances
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.