Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management

0
Critical
VulnerabilityCVE-2025-42910cvecve-2025-42910cwe-434
Published: Tue Oct 14 2025 (10/14/2025, 00:18:21 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Supplier Relationship Management

Description

Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.

AI-Powered Analysis

AILast updated: 10/21/2025, 04:40:19 UTC

Technical Analysis

CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is the lack of proper validation or verification of uploaded file types or content, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This flaw allows an authenticated attacker to upload arbitrary files, including potentially malicious executables. Once uploaded, these files can be downloaded and executed by users, which could lead to malware infections or further compromise of the system. The vulnerability affects the confidentiality, integrity, and availability of the SAP SRM application, as attackers could exfiltrate sensitive data, modify or corrupt data, or disrupt service availability. The CVSS v3.1 base score is 9.0 (critical), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating network attack vector, low attack complexity, requiring low privileges and user interaction, with a scope change and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of SAP SRM in enterprise supply chain management. The absence of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation. Attackers exploiting this vulnerability could gain a foothold in enterprise environments, potentially leading to ransomware deployment, data breaches, or supply chain disruptions.

Potential Impact

For European organizations, the impact of CVE-2025-42910 could be severe. SAP SRM is widely used across industries such as manufacturing, automotive, pharmaceuticals, and retail, all critical sectors in Europe. Successful exploitation could lead to unauthorized access to sensitive supplier and procurement data, intellectual property theft, and disruption of supply chain operations. This could result in financial losses, regulatory penalties under GDPR for data breaches, and damage to corporate reputation. The ability to upload and execute malicious files increases the risk of malware outbreaks, including ransomware, which could halt business operations. Given the interconnected nature of supply chains, a compromise in one organization could cascade to partners and suppliers, amplifying the impact. The requirement for authentication and user interaction somewhat limits exploitation but does not eliminate risk, especially in environments with weak access controls or social engineering susceptibility.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review and restrict file upload functionality in SAP SRM, enforcing strict file type whitelisting and content scanning to prevent dangerous file types. 2) Apply SAP security notes and patches as soon as they become available; monitor SAP’s official channels for updates on this CVE. 3) Enforce strong authentication mechanisms and least privilege principles to limit attacker access. 4) Educate users about the risks of downloading and executing files from SAP SRM, emphasizing caution with unexpected or suspicious files. 5) Deploy endpoint protection and advanced malware detection solutions to identify and block malicious payloads. 6) Monitor SAP SRM logs and network traffic for unusual file upload or download activities. 7) Consider isolating SAP SRM environments and restricting internet access to reduce exposure. 8) Conduct regular security assessments and penetration tests focusing on file upload functionalities. These targeted actions go beyond generic advice and address the specific exploitation vector of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b4e

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 10/21/2025, 4:40:19 AM

Last updated: 12/4/2025, 11:37:54 AM

Views: 313

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats