Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java

0
Medium
VulnerabilityCVE-2025-42919cvecve-2025-42919cwe-22
Published: Tue Nov 11 2025 (11/11/2025, 00:20:18 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server Java

Description

CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java, specifically affecting versions ENGINEAPI 7. 50 and EP-BASIS 7. 50. The flaw arises from improper limitation of pathname inputs (CWE-22), allowing unauthenticated attackers to manipulate URLs to access internal metadata files. This unauthorized access compromises the confidentiality of sensitive application metadata but does not impact integrity or availability. The vulnerability has a CVSS 3. 1 base score of 5. 3, indicating medium severity. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild, and no patches have been linked yet.

AI-Powered Analysis

AILast updated: 11/11/2025, 01:00:49 UTC

Technical Analysis

CVE-2025-42919 is a medium-severity vulnerability in SAP NetWeaver Application Server Java versions ENGINEAPI 7.50 and EP-BASIS 7.50. The root cause is improper limitation of pathname inputs (CWE-22), which allows an attacker to perform directory traversal via manipulated URLs. By inserting arbitrary path components into the request URL, an unauthenticated attacker can access internal metadata files that should be restricted. These metadata files may contain sensitive information about the application server's configuration or internal workings, leading to partial confidentiality compromise. The vulnerability does not affect the integrity or availability of the system, meaning attackers cannot alter data or disrupt service through this flaw. The attack vector is network-based, requiring no privileges or user interaction, which increases the risk of exploitation. However, as of the publication date, no known exploits have been observed in the wild, and no official patches have been released. The vulnerability highlights the importance of proper input validation and secure coding practices in web-facing components of enterprise software. Organizations running the affected SAP NetWeaver versions should be aware of this risk and prepare to apply vendor patches or mitigations once available.

Potential Impact

For European organizations, the impact of CVE-2025-42919 centers on unauthorized disclosure of sensitive metadata within SAP NetWeaver Application Server Java environments. This could expose internal configuration details, potentially aiding attackers in crafting more targeted attacks or gaining further access. While the vulnerability does not directly allow data modification or service disruption, the leakage of metadata can weaken overall security posture and increase the risk of subsequent attacks. Industries heavily reliant on SAP for critical business processes, such as manufacturing, finance, utilities, and public sector entities, may face increased risk if attackers leverage disclosed information for lateral movement or reconnaissance. The medium severity score reflects a moderate risk, but the ease of exploitation without authentication means organizations should not underestimate the threat. European enterprises with internet-facing SAP NetWeaver services or insufficient network segmentation are particularly vulnerable. Protecting confidentiality of enterprise metadata is crucial to maintaining trust, compliance, and operational security.

Mitigation Recommendations

1. Immediately restrict external network access to SAP NetWeaver Application Server Java endpoints, especially those serving metadata or administrative functions, using firewalls or network segmentation. 2. Implement strict input validation and URL filtering at the web server or application gateway level to block path traversal attempts and malformed URLs. 3. Monitor web server and application logs for unusual URL patterns indicative of directory traversal attacks. 4. Engage with SAP support channels to obtain and apply official security patches or hotfixes as soon as they are released for the affected versions. 5. Conduct a thorough review of SAP NetWeaver configurations to disable or limit exposure of metadata files where possible. 6. Employ web application firewalls (WAFs) with updated rules to detect and block exploitation attempts targeting CWE-22 vulnerabilities. 7. Train security and IT staff on recognizing signs of reconnaissance activity that may leverage disclosed metadata. 8. Consider deploying endpoint detection and response (EDR) solutions to identify suspicious activity related to SAP server access. 9. Maintain an up-to-date asset inventory to quickly identify all SAP NetWeaver instances and prioritize remediation efforts. 10. Plan for upgrading SAP NetWeaver components to supported versions with improved security controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:30.253Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3c08

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 11/11/2025, 1:00:49 AM

Last updated: 11/11/2025, 1:52:37 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats