Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42913: CWE-862: Missing Authorization in SAP_SE SAP HCM (My Timesheet Fiori 2.0 application)

0
Low
VulnerabilityCVE-2025-42913cvecve-2025-42913cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 02:06:16 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP HCM (My Timesheet Fiori 2.0 application)

Description

Due to missing authorization checks, SAP HCM My Timesheet Fiori 2.0 application allows an authenticated attacker with in-depth system knowledge to escalate privileges and perform activities that are otherwise restricted, resulting in a low impact on the integrity of the application. Confidentiality and availability are not impacted.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:12:43 UTC

Technical Analysis

CVE-2025-42913 is a vulnerability identified in the SAP HCM My Timesheet Fiori 2.0 application, specifically version GBX01HR5 605. The root cause is a missing authorization check (CWE-862) that allows an authenticated attacker with detailed system knowledge to escalate privileges within the application. This escalation enables the attacker to perform restricted activities that should normally be inaccessible. The vulnerability impacts the integrity of the application by permitting unauthorized modifications or actions but does not affect confidentiality or availability. The CVSS v3.1 base score is 3.1, indicating a low severity level. The attack vector is network-based (AV:N), requiring low privileges (PR:L) and high attack complexity (AC:H), with no user interaction needed (UI:N). The scope remains unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is significant in environments where SAP HCM My Timesheet Fiori 2.0 is deployed, as it could allow malicious insiders or compromised users to perform unauthorized operations, potentially leading to data integrity issues or unauthorized process manipulations within human capital management workflows.

Potential Impact

For European organizations using SAP HCM My Timesheet Fiori 2.0, this vulnerability poses a risk primarily to the integrity of HR-related data and processes. Unauthorized privilege escalation could allow attackers to manipulate timesheet data, potentially leading to payroll errors, fraudulent time reporting, or unauthorized access to restricted HR functions. While confidentiality and availability are not impacted, the integrity compromise could undermine trust in HR systems and cause operational disruptions or compliance issues, especially under strict European data governance frameworks such as GDPR. Organizations with complex SAP HCM deployments or those relying heavily on automated HR workflows are at higher risk of operational impact. The requirement for authenticated access and in-depth system knowledge somewhat limits the threat to insider threats or attackers who have already gained some foothold within the network.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Apply any SAP security patches or updates as soon as they become available for the affected SAP HCM My Timesheet Fiori 2.0 version. 2) Conduct a thorough review of user roles and permissions within the SAP HCM environment to ensure the principle of least privilege is enforced, minimizing the number of users with elevated access. 3) Implement enhanced monitoring and logging of privileged actions within the SAP HCM application to detect unusual or unauthorized activities promptly. 4) Restrict access to the SAP HCM My Timesheet Fiori 2.0 application to trusted networks and users, possibly leveraging network segmentation and VPNs. 5) Provide targeted security awareness training to HR and IT staff about the risks of privilege escalation and the importance of safeguarding credentials. 6) Consider deploying application-level access control mechanisms or compensating controls such as SAP’s Security Audit Log and SAP Enterprise Threat Detection to identify and respond to suspicious privilege escalations. 7) Regularly audit SAP system configurations and authorization objects related to the Fiori application to detect and remediate missing or misconfigured authorization checks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:30.252Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8df9d5a2966cfc858132

Added to database: 9/9/2025, 2:16:25 AM

Last enriched: 9/17/2025, 1:12:43 AM

Last updated: 10/29/2025, 9:48:32 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats