CVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java
CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java, specifically affecting versions ENGINEAPI 7. 50 and EP-BASIS 7. 50. The flaw arises from improper limitation of pathname inputs (CWE-22), allowing unauthenticated attackers to manipulate URLs to access internal metadata files. This unauthorized access compromises the confidentiality of sensitive application metadata but does not impact integrity or availability. The vulnerability has a CVSS 3. 1 base score of 5. 3, indicating medium severity. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild, and no patches have been linked yet.
AI Analysis
Technical Summary
CVE-2025-42919 is a medium-severity vulnerability in SAP NetWeaver Application Server Java versions ENGINEAPI 7.50 and EP-BASIS 7.50. The root cause is improper limitation of pathname inputs (CWE-22), which allows an attacker to perform directory traversal via manipulated URLs. By inserting arbitrary path components into the request URL, an unauthenticated attacker can access internal metadata files that should be restricted. These metadata files may contain sensitive information about the application server's configuration or internal workings, leading to partial confidentiality compromise. The vulnerability does not affect the integrity or availability of the system, meaning attackers cannot alter data or disrupt service through this flaw. The attack vector is network-based, requiring no privileges or user interaction, which increases the risk of exploitation. However, as of the publication date, no known exploits have been observed in the wild, and no official patches have been released. The vulnerability highlights the importance of proper input validation and secure coding practices in web-facing components of enterprise software. Organizations running the affected SAP NetWeaver versions should be aware of this risk and prepare to apply vendor patches or mitigations once available.
Potential Impact
For European organizations, the impact of CVE-2025-42919 centers on unauthorized disclosure of sensitive metadata within SAP NetWeaver Application Server Java environments. This could expose internal configuration details, potentially aiding attackers in crafting more targeted attacks or gaining further access. While the vulnerability does not directly allow data modification or service disruption, the leakage of metadata can weaken overall security posture and increase the risk of subsequent attacks. Industries heavily reliant on SAP for critical business processes, such as manufacturing, finance, utilities, and public sector entities, may face increased risk if attackers leverage disclosed information for lateral movement or reconnaissance. The medium severity score reflects a moderate risk, but the ease of exploitation without authentication means organizations should not underestimate the threat. European enterprises with internet-facing SAP NetWeaver services or insufficient network segmentation are particularly vulnerable. Protecting confidentiality of enterprise metadata is crucial to maintaining trust, compliance, and operational security.
Mitigation Recommendations
1. Immediately restrict external network access to SAP NetWeaver Application Server Java endpoints, especially those serving metadata or administrative functions, using firewalls or network segmentation. 2. Implement strict input validation and URL filtering at the web server or application gateway level to block path traversal attempts and malformed URLs. 3. Monitor web server and application logs for unusual URL patterns indicative of directory traversal attacks. 4. Engage with SAP support channels to obtain and apply official security patches or hotfixes as soon as they are released for the affected versions. 5. Conduct a thorough review of SAP NetWeaver configurations to disable or limit exposure of metadata files where possible. 6. Employ web application firewalls (WAFs) with updated rules to detect and block exploitation attempts targeting CWE-22 vulnerabilities. 7. Train security and IT staff on recognizing signs of reconnaissance activity that may leverage disclosed metadata. 8. Consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to SAP server access. 9. Maintain an up-to-date asset inventory to quickly identify all SAP NetWeaver instances and prioritize remediation efforts. 10. Plan for upgrading SAP NetWeaver components to supported versions with improved security controls.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java
Description
CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java, specifically affecting versions ENGINEAPI 7. 50 and EP-BASIS 7. 50. The flaw arises from improper limitation of pathname inputs (CWE-22), allowing unauthenticated attackers to manipulate URLs to access internal metadata files. This unauthorized access compromises the confidentiality of sensitive application metadata but does not impact integrity or availability. The vulnerability has a CVSS 3. 1 base score of 5. 3, indicating medium severity. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild, and no patches have been linked yet.
AI-Powered Analysis
Technical Analysis
CVE-2025-42919 is a medium-severity vulnerability in SAP NetWeaver Application Server Java versions ENGINEAPI 7.50 and EP-BASIS 7.50. The root cause is improper limitation of pathname inputs (CWE-22), which allows an attacker to perform directory traversal via manipulated URLs. By inserting arbitrary path components into the request URL, an unauthenticated attacker can access internal metadata files that should be restricted. These metadata files may contain sensitive information about the application server's configuration or internal workings, leading to partial confidentiality compromise. The vulnerability does not affect the integrity or availability of the system, meaning attackers cannot alter data or disrupt service through this flaw. The attack vector is network-based, requiring no privileges or user interaction, which increases the risk of exploitation. However, as of the publication date, no known exploits have been observed in the wild, and no official patches have been released. The vulnerability highlights the importance of proper input validation and secure coding practices in web-facing components of enterprise software. Organizations running the affected SAP NetWeaver versions should be aware of this risk and prepare to apply vendor patches or mitigations once available.
Potential Impact
For European organizations, the impact of CVE-2025-42919 centers on unauthorized disclosure of sensitive metadata within SAP NetWeaver Application Server Java environments. This could expose internal configuration details, potentially aiding attackers in crafting more targeted attacks or gaining further access. While the vulnerability does not directly allow data modification or service disruption, the leakage of metadata can weaken overall security posture and increase the risk of subsequent attacks. Industries heavily reliant on SAP for critical business processes, such as manufacturing, finance, utilities, and public sector entities, may face increased risk if attackers leverage disclosed information for lateral movement or reconnaissance. The medium severity score reflects a moderate risk, but the ease of exploitation without authentication means organizations should not underestimate the threat. European enterprises with internet-facing SAP NetWeaver services or insufficient network segmentation are particularly vulnerable. Protecting confidentiality of enterprise metadata is crucial to maintaining trust, compliance, and operational security.
Mitigation Recommendations
1. Immediately restrict external network access to SAP NetWeaver Application Server Java endpoints, especially those serving metadata or administrative functions, using firewalls or network segmentation. 2. Implement strict input validation and URL filtering at the web server or application gateway level to block path traversal attempts and malformed URLs. 3. Monitor web server and application logs for unusual URL patterns indicative of directory traversal attacks. 4. Engage with SAP support channels to obtain and apply official security patches or hotfixes as soon as they are released for the affected versions. 5. Conduct a thorough review of SAP NetWeaver configurations to disable or limit exposure of metadata files where possible. 6. Employ web application firewalls (WAFs) with updated rules to detect and block exploitation attempts targeting CWE-22 vulnerabilities. 7. Train security and IT staff on recognizing signs of reconnaissance activity that may leverage disclosed metadata. 8. Consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to SAP server access. 9. Maintain an up-to-date asset inventory to quickly identify all SAP NetWeaver instances and prioritize remediation efforts. 10. Plan for upgrading SAP NetWeaver components to supported versions with improved security controls.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:30.253Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912870814bc3e00ba6f3c08
Added to database: 11/11/2025, 12:44:56 AM
Last enriched: 11/11/2025, 1:00:49 AM
Last updated: 11/11/2025, 1:52:37 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-42940: CWE-787: Out-of-bounds Write in SAP_SE SAP CommonCryptoLib
HighCVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)
MediumCVE-2025-42899: CWE-862: Missing Authorization in SAP_SE SAP S4CORE (Manage Journal Entries)
MediumCVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
MediumCVE-2025-42895: CWE-94: Improper Control of Generation of Code in SAP_SE SAP HANA JDBC Client
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.