Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42912: CWE-862: Missing Authorization in SAP_SE SAP HCM (My Timesheet Fiori 2.0 application)

0
Medium
VulnerabilityCVE-2025-42912cvecve-2025-42912cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 02:06:08 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP HCM (My Timesheet Fiori 2.0 application)

Description

SAP HCM My Timesheet Fiori 2.0 application does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This issue has a significant impact on the application's integrity, while confidentiality and availability remain unaffected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:03:56 UTC

Technical Analysis

CVE-2025-42912 is a vulnerability identified in the SAP HCM (Human Capital Management) My Timesheet Fiori 2.0 application, specifically version GBX01HR5 605. The root cause is a missing authorization check (CWE-862) within the application, which means that authenticated users are not properly validated for their permissions before performing certain actions. This flaw allows users with limited privileges to escalate their privileges within the application, potentially modifying timesheet data or performing unauthorized operations that affect the integrity of the system. The vulnerability does not impact confidentiality or availability, indicating that sensitive data exposure or denial of service are not primary concerns here. The CVSS v3.1 base score is 6.5 (medium), reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means an attacker must already have some level of authenticated access but can then escalate privileges without further interaction. No public exploits have been reported yet, but the vulnerability poses a significant risk to the integrity of workforce management data, which is critical for organizational operations. The missing authorization checks could be exploited to alter timesheet entries, potentially affecting payroll, compliance, and auditing processes. Given SAP HCM's widespread use in large enterprises globally, this vulnerability warrants prompt attention.

Potential Impact

The primary impact of CVE-2025-42912 is on the integrity of the SAP HCM My Timesheet application data. Unauthorized privilege escalation can lead to unauthorized modification of timesheet records, which can disrupt payroll accuracy, compliance with labor regulations, and internal auditing processes. This can result in financial losses, legal liabilities, and damage to organizational trust. Since confidentiality and availability are unaffected, the risk of data leakage or service disruption is low. However, the integrity compromise can have cascading effects on HR operations and employee trust. Organizations relying heavily on SAP HCM for workforce management, especially those with complex payroll and compliance requirements, face significant operational risks if this vulnerability is exploited. Attackers with authenticated access, such as disgruntled employees or compromised accounts, could abuse this flaw to manipulate records undetected. The absence of known exploits in the wild provides a window for remediation, but the vulnerability's nature makes it a high priority for patching and mitigation.

Mitigation Recommendations

1. Apply SAP security patches or updates as soon as they become available for the affected SAP HCM My Timesheet Fiori 2.0 application version GBX01HR5 605. 2. Conduct a thorough review of user roles and permissions within SAP HCM to ensure the principle of least privilege is enforced, minimizing the number of users with elevated privileges. 3. Implement strict access control policies and monitor for anomalous privilege escalation activities or unauthorized modifications to timesheet data. 4. Use SAP's security audit logs and monitoring tools to detect suspicious behavior related to timesheet entries or privilege changes. 5. Restrict network access to the SAP HCM application to trusted internal networks or VPNs to reduce exposure to external attackers. 6. Educate users about the importance of safeguarding their credentials to prevent account compromise. 7. Consider implementing multi-factor authentication (MFA) for SAP HCM access to reduce the risk of unauthorized access. 8. Regularly review and update authorization checks in custom SAP Fiori applications to prevent similar issues. 9. Engage with SAP support and security advisories to stay informed about patches and best practices related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:30.252Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8df9d5a2966cfc85812e

Added to database: 9/9/2025, 2:16:25 AM

Last enriched: 2/27/2026, 2:03:56 AM

Last updated: 3/22/2026, 7:54:18 PM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses