Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42922: CWE-94: Improper Control of Generation of Code in SAP_SE SAP NetWeaver AS Java (Deploy Web Service)

0
Critical
VulnerabilityCVE-2025-42922cvecve-2025-42922cwe-94
Published: Tue Sep 09 2025 (09/09/2025, 02:09:38 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver AS Java (Deploy Web Service)

Description

SAP NetWeaver AS Java allows an attacker authenticated as a non-administrative user to use a flaw in an available service to upload an arbitrary file. This file when executed can lead to a full compromise of confidentiality, integrity and availability of the system.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:13:19 UTC

Technical Analysis

CVE-2025-42922 is a critical vulnerability identified in SAP NetWeaver AS Java, specifically affecting the Deploy Web Service component in version J2EE-APPS 7.50. The vulnerability is classified under CWE-94, which pertains to improper control of code generation. This flaw allows an attacker who is authenticated as a non-administrative user to upload an arbitrary file via an available service. The uploaded file, when executed, can lead to a full compromise of the system's confidentiality, integrity, and availability. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only requires privileges of a non-administrative user (PR:L) without any user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The CVSS v3.1 base score is 9.9, indicating a critical severity level. Exploitation could allow attackers to execute arbitrary code, potentially leading to complete system takeover, data theft, data manipulation, or service disruption. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a high-risk issue for organizations using the affected SAP NetWeaver AS Java version. The lack of available patches at the time of publication further increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-42922 could be severe due to the widespread use of SAP NetWeaver AS Java in enterprise environments for critical business applications. Successful exploitation could lead to unauthorized access to sensitive business data, intellectual property theft, disruption of business processes, and potential regulatory non-compliance with GDPR due to data breaches. The ability for a non-administrative user to escalate privileges and execute arbitrary code could allow attackers to move laterally within networks, compromise additional systems, and establish persistent footholds. This could result in significant financial losses, reputational damage, and operational downtime. Given the critical role SAP systems often play in supply chain management, finance, and customer relationship management, the threat extends beyond IT departments to impact entire business operations.

Mitigation Recommendations

Organizations should immediately audit their SAP NetWeaver AS Java environments to identify instances of version J2EE-APPS 7.50 and restrict access to the Deploy Web Service to only trusted and necessary users. Implement strict access controls and monitor for unusual file upload activities. Employ network segmentation to isolate SAP systems from general user networks and external access where possible. Since no patches are currently available, consider deploying virtual patching through Web Application Firewalls (WAFs) that can detect and block suspicious upload requests targeting the Deploy Web Service. Enable detailed logging and real-time monitoring of SAP system activities to detect potential exploitation attempts early. Additionally, conduct user privilege reviews to minimize the number of users with upload capabilities and enforce multi-factor authentication for all SAP user accounts. Prepare incident response plans specifically addressing SAP system compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:32.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8dfad5a2966cfc858158

Added to database: 9/9/2025, 2:16:26 AM

Last enriched: 9/17/2025, 1:13:19 AM

Last updated: 10/30/2025, 6:09:06 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats