Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management

0
Critical
VulnerabilityCVE-2025-42910cvecve-2025-42910cwe-434
Published: Tue Oct 14 2025 (10/14/2025, 00:18:21 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Supplier Relationship Management

Description

Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.

AI-Powered Analysis

AILast updated: 10/14/2025, 01:05:00 UTC

Technical Analysis

CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is a lack of proper validation on uploaded files, specifically the absence of verification for file type or content, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This allows an authenticated attacker to upload arbitrary files, including potentially malicious executables. Once uploaded, these files could be downloaded and executed by users, leading to the execution of malware within the trusted environment of the SAP SRM application. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, data theft, or service disruption. The CVSS v3.1 score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable with low attack complexity, requiring low privileges and user interaction, but with a scope change affecting multiple components. Although no exploits have been observed in the wild yet, the critical nature of SAP SRM in managing supplier relationships and procurement processes makes this vulnerability a significant risk. The lack of patch links suggests that SAP may not have released an official fix at the time of publication, emphasizing the need for immediate compensating controls. The vulnerability could be leveraged to implant malware, disrupt supply chain operations, or exfiltrate sensitive business data, potentially causing severe operational and reputational damage.

Potential Impact

For European organizations, the impact of CVE-2025-42910 is substantial due to the widespread use of SAP SRM in managing supplier relationships, procurement, and supply chain logistics. Exploitation could lead to unauthorized access to sensitive supplier and procurement data, manipulation of purchase orders, and disruption of supply chain operations, which are critical for manufacturing, retail, and public sector entities. The confidentiality breach could expose business secrets and supplier contracts, while integrity violations might result in fraudulent transactions or altered procurement records. Availability impacts could cause downtime in procurement processes, delaying critical supplies and affecting business continuity. Given Europe's reliance on complex supply chains and regulatory requirements such as GDPR, a compromise could also lead to legal and compliance repercussions. The vulnerability's requirement for authentication and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with weak access controls or insider threats. The potential for malware deployment further raises concerns about lateral movement within enterprise networks and persistent threats targeting European organizations’ critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-42910, European organizations should implement a multi-layered approach beyond generic patching advice. First, immediately verify if SAP has released patches or security notes addressing this vulnerability and apply them as a priority. In the absence of official patches, enforce strict file upload restrictions by configuring SAP SRM to allow only safe file types and implement content scanning using antivirus and malware detection tools on uploaded files. Employ application-layer firewalls or web application firewalls (WAFs) to monitor and block suspicious upload attempts. Strengthen authentication mechanisms by enforcing multi-factor authentication (MFA) and reviewing user privileges to ensure least privilege principles are applied, minimizing the number of users who can upload files. Conduct regular audits of uploaded files and monitor logs for unusual activity related to file uploads and downloads. Educate users about the risks of executing downloaded files from SAP SRM and establish policies to prevent execution of untrusted files. Additionally, segment the SAP SRM environment from other critical systems to limit lateral movement in case of compromise. Finally, maintain up-to-date backups and incident response plans tailored to supply chain disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:25.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b4e

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 10/14/2025, 1:05:00 AM

Last updated: 10/14/2025, 5:07:44 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats