Skip to main content

CVE-2025-42923: CWE-352: Cross-Site Request Forgery (CSRF) in SAP_SE SAP Fiori App (F4044 Manage Work Center Groups)

Medium
VulnerabilityCVE-2025-42923cvecve-2025-42923cwe-352
Published: Tue Sep 09 2025 (09/09/2025, 02:09:47 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Fiori App (F4044 Manage Work Center Groups)

Description

Due to insufficient CSRF protection in SAP Fiori App Manage Work Center Groups, an authenticated user could be tricked by an attacker to send unintended request to the web server. This has low impact on integrity and no impact on confidentiality and availability of the application.

AI-Powered Analysis

AILast updated: 09/09/2025, 02:33:07 UTC

Technical Analysis

CVE-2025-42923 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SAP Fiori App 'Manage Work Center Groups' (F4044) developed by SAP SE. This vulnerability arises due to insufficient CSRF protection mechanisms within the application, allowing an authenticated user to be tricked by an attacker into sending unintended requests to the web server. Specifically, the flaw enables an attacker to craft malicious web requests that, when executed by a logged-in user, perform unauthorized actions on their behalf without their consent or knowledge. The affected versions include UIS4HOP1 600, 700, 800, and 900. The vulnerability does not impact confidentiality or availability but has a low impact on data integrity, as unauthorized changes to work center groups could be made. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and requires privileges of an authenticated user but no user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which corresponds to CSRF attacks that exploit the trust a web application places in the user's browser. Given the nature of SAP Fiori apps as critical enterprise resource planning (ERP) interfaces, this vulnerability could be leveraged to manipulate business process configurations or user group settings, potentially disrupting workflows or causing unauthorized changes in organizational resource management.

Potential Impact

For European organizations using SAP Fiori applications, particularly the Manage Work Center Groups app, this vulnerability poses a risk of unauthorized modification of work center group configurations. While it does not compromise sensitive data confidentiality or system availability, the integrity of business process configurations could be affected. This could lead to operational inefficiencies, misallocation of resources, or unauthorized privilege escalations within the SAP environment if attackers manipulate group memberships or permissions indirectly. Given SAP's widespread adoption across European industries such as manufacturing, logistics, and finance, even a low-integrity impact vulnerability can have cascading effects on business operations and compliance with regulatory frameworks like GDPR if improper access controls result. The requirement for an authenticated user to be tricked into executing the malicious request limits the attack surface but does not eliminate risk, especially in environments with many users and complex workflows. The absence of known exploits reduces immediate risk but does not preclude targeted attacks, especially from advanced persistent threat (APT) actors focusing on ERP systems.

Mitigation Recommendations

To mitigate CVE-2025-42923, European organizations should implement the following specific measures: 1) Apply SAP security patches promptly once released for the affected SAP Fiori app versions to ensure proper CSRF protections are enforced. 2) Enforce strict session management and implement additional CSRF tokens or double-submit cookie patterns in custom SAP Fiori app extensions or configurations. 3) Conduct user awareness training to reduce the risk of users being tricked into executing malicious requests, emphasizing cautious behavior with unsolicited links or embedded content. 4) Restrict SAP Fiori app access to trusted networks and use network segmentation to limit exposure of the SAP web interface. 5) Monitor SAP application logs for unusual or unauthorized changes to work center groups and implement anomaly detection to identify potential CSRF exploitation attempts. 6) Review and tighten user privileges to follow the principle of least privilege, minimizing the number of users with rights to modify work center groups. 7) Employ web application firewalls (WAFs) with rules tuned to detect and block CSRF attack patterns targeting SAP Fiori endpoints. These targeted mitigations go beyond generic advice by focusing on SAP-specific controls, user behavior, and network-level protections.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:32.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf8dfad5a2966cfc85815c

Added to database: 9/9/2025, 2:16:26 AM

Last enriched: 9/9/2025, 2:33:07 AM

Last updated: 9/9/2025, 9:35:55 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats