Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42912: CWE-862: Missing Authorization in SAP_SE SAP HCM (My Timesheet Fiori 2.0 application)

0
Medium
VulnerabilityCVE-2025-42912cvecve-2025-42912cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 02:06:08 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP HCM (My Timesheet Fiori 2.0 application)

Description

SAP HCM My Timesheet Fiori 2.0 application does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This issue has a significant impact on the application's integrity, while confidentiality and availability remain unaffected.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:12:32 UTC

Technical Analysis

CVE-2025-42912 is a medium-severity vulnerability identified in the SAP HCM My Timesheet Fiori 2.0 application, specifically version GBX01HR5 605. The root cause is a missing authorization check (CWE-862) within the application, which allows an authenticated user with limited privileges to escalate their privileges improperly. This flaw affects the integrity of the application by enabling unauthorized modification or manipulation of timesheet data or related HR records. The vulnerability does not impact confidentiality or availability, indicating that sensitive data exposure or denial of service conditions are not direct consequences. The CVSS 3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in April 2025 and published in September 2025. This issue is critical for organizations relying on SAP HCM Fiori 2.0 for workforce management, as unauthorized privilege escalation could lead to fraudulent timesheet entries, payroll manipulation, or unauthorized HR data changes, undermining operational integrity and compliance.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those heavily dependent on SAP HCM for human capital management and payroll processing. Unauthorized privilege escalation could allow malicious insiders or compromised accounts to alter timesheet data, potentially leading to financial losses, regulatory non-compliance (e.g., GDPR if personal data integrity is compromised), and reputational damage. While confidentiality and availability are unaffected, the integrity breach could disrupt payroll accuracy and employee trust. Organizations in sectors with strict labor regulations, such as manufacturing, healthcare, and public administration, may face increased scrutiny and legal consequences if such manipulations occur. Additionally, the interconnected nature of SAP systems means that integrity issues in one module could cascade, affecting broader HR and financial processes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and tighten authorization policies within the SAP HCM My Timesheet Fiori 2.0 application, ensuring that role-based access controls are strictly enforced and that users have only the minimum necessary privileges. 2) Implement compensating controls such as enhanced logging and monitoring of timesheet modifications to detect anomalous activities promptly. 3) Conduct thorough audits of timesheet and payroll data for inconsistencies that may indicate exploitation. 4) Engage with SAP support channels to obtain patches or hotfixes as soon as they become available and prioritize their deployment in test and production environments. 5) Restrict network access to the SAP Fiori launchpad and backend systems to trusted internal networks and VPNs, reducing exposure to remote exploitation. 6) Train HR and IT security teams on this specific vulnerability to recognize potential exploitation indicators. 7) Consider implementing multi-factor authentication (MFA) for all SAP users to reduce the risk of compromised credentials being used to exploit this flaw.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:30.252Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8df9d5a2966cfc85812e

Added to database: 9/9/2025, 2:16:25 AM

Last enriched: 9/17/2025, 1:12:32 AM

Last updated: 10/29/2025, 9:48:32 AM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats