CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management
Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.
AI Analysis
Technical Summary
CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is the lack of proper validation or verification of uploaded file types or content, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This flaw allows an authenticated attacker to upload arbitrary files, including potentially malicious executables. Once uploaded, these files can be downloaded and executed by users, which could lead to malware infections or further compromise of the system. The vulnerability affects the confidentiality, integrity, and availability of the SAP SRM application, as attackers could exfiltrate sensitive data, modify or corrupt data, or disrupt service availability. The CVSS v3.1 base score is 9.0 (critical), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating network attack vector, low attack complexity, requiring low privileges and user interaction, with a scope change and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of SAP SRM in enterprise supply chain management. The absence of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation. Attackers exploiting this vulnerability could gain a foothold in enterprise environments, potentially leading to ransomware deployment, data breaches, or supply chain disruptions.
Potential Impact
For European organizations, the impact of CVE-2025-42910 could be severe. SAP SRM is widely used across industries such as manufacturing, automotive, pharmaceuticals, and retail, all critical sectors in Europe. Successful exploitation could lead to unauthorized access to sensitive supplier and procurement data, intellectual property theft, and disruption of supply chain operations. This could result in financial losses, regulatory penalties under GDPR for data breaches, and damage to corporate reputation. The ability to upload and execute malicious files increases the risk of malware outbreaks, including ransomware, which could halt business operations. Given the interconnected nature of supply chains, a compromise in one organization could cascade to partners and suppliers, amplifying the impact. The requirement for authentication and user interaction somewhat limits exploitation but does not eliminate risk, especially in environments with weak access controls or social engineering susceptibility.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately review and restrict file upload functionality in SAP SRM, enforcing strict file type whitelisting and content scanning to prevent dangerous file types. 2) Apply SAP security notes and patches as soon as they become available; monitor SAP’s official channels for updates on this CVE. 3) Enforce strong authentication mechanisms and least privilege principles to limit attacker access. 4) Educate users about the risks of downloading and executing files from SAP SRM, emphasizing caution with unexpected or suspicious files. 5) Deploy endpoint protection and advanced malware detection solutions to identify and block malicious payloads. 6) Monitor SAP SRM logs and network traffic for unusual file upload or download activities. 7) Consider isolating SAP SRM environments and restricting internet access to reduce exposure. 8) Conduct regular security assessments and penetration tests focusing on file upload functionalities. These targeted actions go beyond generic advice and address the specific exploitation vector of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management
Description
Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-42910 is a critical security vulnerability identified in SAP Supplier Relationship Management (SRM) versions SRMNXP01 100 and 150. The root cause is the lack of proper validation or verification of uploaded file types or content, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). This flaw allows an authenticated attacker to upload arbitrary files, including potentially malicious executables. Once uploaded, these files can be downloaded and executed by users, which could lead to malware infections or further compromise of the system. The vulnerability affects the confidentiality, integrity, and availability of the SAP SRM application, as attackers could exfiltrate sensitive data, modify or corrupt data, or disrupt service availability. The CVSS v3.1 base score is 9.0 (critical), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating network attack vector, low attack complexity, requiring low privileges and user interaction, with a scope change and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the widespread use of SAP SRM in enterprise supply chain management. The absence of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation. Attackers exploiting this vulnerability could gain a foothold in enterprise environments, potentially leading to ransomware deployment, data breaches, or supply chain disruptions.
Potential Impact
For European organizations, the impact of CVE-2025-42910 could be severe. SAP SRM is widely used across industries such as manufacturing, automotive, pharmaceuticals, and retail, all critical sectors in Europe. Successful exploitation could lead to unauthorized access to sensitive supplier and procurement data, intellectual property theft, and disruption of supply chain operations. This could result in financial losses, regulatory penalties under GDPR for data breaches, and damage to corporate reputation. The ability to upload and execute malicious files increases the risk of malware outbreaks, including ransomware, which could halt business operations. Given the interconnected nature of supply chains, a compromise in one organization could cascade to partners and suppliers, amplifying the impact. The requirement for authentication and user interaction somewhat limits exploitation but does not eliminate risk, especially in environments with weak access controls or social engineering susceptibility.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately review and restrict file upload functionality in SAP SRM, enforcing strict file type whitelisting and content scanning to prevent dangerous file types. 2) Apply SAP security notes and patches as soon as they become available; monitor SAP’s official channels for updates on this CVE. 3) Enforce strong authentication mechanisms and least privilege principles to limit attacker access. 4) Educate users about the risks of downloading and executing files from SAP SRM, emphasizing caution with unexpected or suspicious files. 5) Deploy endpoint protection and advanced malware detection solutions to identify and block malicious payloads. 6) Monitor SAP SRM logs and network traffic for unusual file upload or download activities. 7) Consider isolating SAP SRM environments and restricting internet access to reduce exposure. 8) Conduct regular security assessments and penetration tests focusing on file upload functionalities. These targeted actions go beyond generic advice and address the specific exploitation vector of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:25.737Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ed9e3ae121319cf76b7b4e
Added to database: 10/14/2025, 12:50:02 AM
Last enriched: 10/21/2025, 4:40:19 AM
Last updated: 12/4/2025, 11:37:54 AM
Views: 313
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.