Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42922: CWE-94: Improper Control of Generation of Code in SAP_SE SAP NetWeaver AS Java (Deploy Web Service)

0
Critical
VulnerabilityCVE-2025-42922cvecve-2025-42922cwe-94
Published: Tue Sep 09 2025 (09/09/2025, 02:09:38 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver AS Java (Deploy Web Service)

Description

SAP NetWeaver AS Java allows an attacker authenticated as a non-administrative user to use a flaw in an available service to upload an arbitrary file. This file when executed can lead to a full compromise of confidentiality, integrity and availability of the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:04:55 UTC

Technical Analysis

CVE-2025-42922 is a critical security vulnerability identified in SAP NetWeaver AS Java, specifically affecting the Deploy Web Service component in version J2EE-APPS 7.50. The root cause is improper control over the generation of code (classified under CWE-94), which allows an authenticated user with non-administrative privileges to upload arbitrary files to the system. These files, once uploaded, can be executed by the system, leading to remote code execution (RCE). This flaw effectively bypasses typical privilege boundaries, enabling attackers to gain full control over the affected system. The vulnerability does not require administrative credentials or user interaction, significantly lowering the barrier to exploitation. The CVSS v3.1 base score of 9.9 reflects the vulnerability's critical nature, with attack vector being network-based, low attack complexity, requiring only low privileges, and no user interaction. The scope is changed, indicating that exploitation affects components beyond the initially vulnerable one, impacting confidentiality, integrity, and availability at a high level. Although no exploits have been reported in the wild yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise enterprise environments running SAP NetWeaver AS Java. The lack of available patches at the time of disclosure increases the urgency for organizations to implement interim mitigations and monitor their environments closely.

Potential Impact

The potential impact of CVE-2025-42922 is severe for organizations worldwide that utilize SAP NetWeaver AS Java, particularly version J2EE-APPS 7.50. Successful exploitation can lead to complete system compromise, including unauthorized access to sensitive data (confidentiality breach), unauthorized modification or deletion of data (integrity breach), and disruption or shutdown of critical services (availability breach). Given SAP NetWeaver's role in managing enterprise resource planning (ERP), supply chain, and business-critical applications, this vulnerability could disrupt business operations, cause financial losses, damage reputations, and expose organizations to regulatory penalties. Attackers could leverage this vulnerability to deploy ransomware, steal intellectual property, or establish persistent footholds for further network exploitation. The fact that exploitation requires only authenticated access with non-administrative privileges broadens the threat landscape, as insider threats or compromised user credentials could be sufficient to launch attacks. The vulnerability's network accessibility and lack of user interaction requirements increase the risk of automated or wormable attacks, potentially affecting multiple systems rapidly.

Mitigation Recommendations

To mitigate CVE-2025-42922, organizations should implement the following specific measures: 1) Immediately restrict access to the Deploy Web Service interface to only trusted and necessary users, employing network segmentation and firewall rules to limit exposure. 2) Enforce strict authentication and authorization policies, including multi-factor authentication (MFA) for all SAP NetWeaver users to reduce the risk of credential compromise. 3) Monitor logs and audit trails for unusual file upload activities or execution attempts within the Deploy Web Service component. 4) Disable or remove unnecessary services or components related to deployment if not required in the environment. 5) Apply SAP security notes and patches promptly once they become available for this vulnerability. 6) Conduct regular security assessments and penetration testing focused on SAP NetWeaver AS Java to identify and remediate similar weaknesses. 7) Educate users about the risks of credential compromise and enforce strong password policies. 8) Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions that can detect and block suspicious code execution attempts. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive defense tailored to the vulnerability's exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:32.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8dfad5a2966cfc858158

Added to database: 9/9/2025, 2:16:26 AM

Last enriched: 2/27/2026, 2:04:55 AM

Last updated: 3/25/2026, 1:43:21 AM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses