Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42917: CWE-862: Missing Authorization in SAP_SE SAP HCM (Approve Timesheets Fiori 2.0 application)

0
Medium
VulnerabilityCVE-2025-42917cvecve-2025-42917cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 02:09:10 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP HCM (Approve Timesheets Fiori 2.0 application)

Description

SAP HCM Approve Timesheets Fiori 2.0 application does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This issue has a significant impact on the application's integrity, while confidentiality and availability remain unaffected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:04:39 UTC

Technical Analysis

CVE-2025-42917 is a vulnerability identified in the SAP HCM Approve Timesheets Fiori 2.0 application, specifically version GBX01HR5 605. The root cause is a missing authorization check (CWE-862), which means that the application does not properly verify whether an authenticated user has the necessary permissions to approve timesheets. This flaw allows users with limited privileges to escalate their privileges within the application context, potentially approving timesheets they should not be authorized to handle. The vulnerability impacts the integrity of the application’s data and processes, as unauthorized approvals can lead to fraudulent or erroneous time reporting. Confidentiality and availability are not impacted, indicating that data exposure or denial of service are not concerns here. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and requires privileges but no user interaction. No patches or known exploits are currently available, so organizations must rely on detection and mitigation strategies until fixes are released. This vulnerability highlights the importance of robust authorization mechanisms in enterprise resource planning (ERP) applications, especially those handling critical HR functions.

Potential Impact

The primary impact of CVE-2025-42917 is the unauthorized escalation of privileges within the SAP HCM Approve Timesheets Fiori 2.0 application, compromising the integrity of timesheet approvals. This can lead to fraudulent time entries, payroll errors, and potential financial losses. Organizations relying on SAP HCM for workforce management may face internal compliance violations, audit failures, and reputational damage if unauthorized approvals go undetected. Although confidentiality and availability are unaffected, the integrity breach can disrupt HR operations and payroll accuracy. Attackers with authenticated access could exploit this vulnerability to manipulate timesheet data, potentially enabling insider threats or external attackers who have compromised user credentials. The lack of known exploits reduces immediate risk, but the vulnerability remains a significant concern for organizations with exposed SAP HCM environments.

Mitigation Recommendations

To mitigate CVE-2025-42917, organizations should first verify if they are running the affected SAP HCM version GBX01HR5 605 and restrict access to the Approve Timesheets Fiori 2.0 application to only trusted and necessary users. Implement strict role-based access controls (RBAC) and regularly audit user permissions to ensure no excessive privileges are granted. Monitor logs for unusual approval activities or access patterns that could indicate exploitation attempts. Until an official patch is released by SAP, consider deploying compensating controls such as multi-factor authentication (MFA) for users accessing the application and segregating duties so that timesheet approval requires multiple independent approvals. Engage with SAP support to obtain updates on patch availability and apply them promptly once released. Additionally, conduct security awareness training for HR and IT staff to recognize and respond to suspicious activities related to timesheet approvals.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:30.252Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8df9d5a2966cfc858142

Added to database: 9/9/2025, 2:16:25 AM

Last enriched: 2/27/2026, 2:04:39 AM

Last updated: 3/25/2026, 1:24:15 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses