CVE-2025-42923: CWE-352: Cross-Site Request Forgery (CSRF) in SAP_SE SAP Fiori App (F4044 Manage Work Center Groups)
Due to insufficient CSRF protection in SAP Fiori App Manage Work Center Groups, an authenticated user could be tricked by an attacker to send unintended request to the web server. This has low impact on integrity and no impact on confidentiality and availability of the application.
AI Analysis
Technical Summary
CVE-2025-42923 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SAP Fiori App 'Manage Work Center Groups' (F4044) developed by SAP SE. This vulnerability arises due to insufficient CSRF protection mechanisms within the application, allowing an authenticated user to be tricked by an attacker into sending unintended requests to the web server. Specifically, the flaw enables an attacker to craft malicious web requests that, when executed by a logged-in user, perform unauthorized actions on their behalf without their consent or knowledge. The affected versions include UIS4HOP1 600, 700, 800, and 900. The vulnerability does not impact confidentiality or availability but has a low impact on data integrity, as unauthorized changes to work center groups could be made. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and requires privileges of an authenticated user but no user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which corresponds to CSRF attacks that exploit the trust a web application places in the user's browser. Given the nature of SAP Fiori apps as critical enterprise resource planning (ERP) interfaces, this vulnerability could be leveraged to manipulate business process configurations or user group settings, potentially disrupting workflows or causing unauthorized changes in organizational resource management.
Potential Impact
For European organizations using SAP Fiori applications, particularly the Manage Work Center Groups app, this vulnerability poses a risk of unauthorized modification of work center group configurations. While it does not compromise sensitive data confidentiality or system availability, the integrity of business process configurations could be affected. This could lead to operational inefficiencies, misallocation of resources, or unauthorized privilege escalations within the SAP environment if attackers manipulate group memberships or permissions indirectly. Given SAP's widespread adoption across European industries such as manufacturing, logistics, and finance, even a low-integrity impact vulnerability can have cascading effects on business operations and compliance with regulatory frameworks like GDPR if improper access controls result. The requirement for an authenticated user to be tricked into executing the malicious request limits the attack surface but does not eliminate risk, especially in environments with many users and complex workflows. The absence of known exploits reduces immediate risk but does not preclude targeted attacks, especially from advanced persistent threat (APT) actors focusing on ERP systems.
Mitigation Recommendations
To mitigate CVE-2025-42923, European organizations should implement the following specific measures: 1) Apply SAP security patches promptly once released for the affected SAP Fiori app versions to ensure proper CSRF protections are enforced. 2) Enforce strict session management and implement additional CSRF tokens or double-submit cookie patterns in custom SAP Fiori app extensions or configurations. 3) Conduct user awareness training to reduce the risk of users being tricked into executing malicious requests, emphasizing cautious behavior with unsolicited links or embedded content. 4) Restrict SAP Fiori app access to trusted networks and use network segmentation to limit exposure of the SAP web interface. 5) Monitor SAP application logs for unusual or unauthorized changes to work center groups and implement anomaly detection to identify potential CSRF exploitation attempts. 6) Review and tighten user privileges to follow the principle of least privilege, minimizing the number of users with rights to modify work center groups. 7) Employ web application firewalls (WAFs) with rules tuned to detect and block CSRF attack patterns targeting SAP Fiori endpoints. These targeted mitigations go beyond generic advice by focusing on SAP-specific controls, user behavior, and network-level protections.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-42923: CWE-352: Cross-Site Request Forgery (CSRF) in SAP_SE SAP Fiori App (F4044 Manage Work Center Groups)
Description
Due to insufficient CSRF protection in SAP Fiori App Manage Work Center Groups, an authenticated user could be tricked by an attacker to send unintended request to the web server. This has low impact on integrity and no impact on confidentiality and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-42923 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the SAP Fiori App 'Manage Work Center Groups' (F4044) developed by SAP SE. This vulnerability arises due to insufficient CSRF protection mechanisms within the application, allowing an authenticated user to be tricked by an attacker into sending unintended requests to the web server. Specifically, the flaw enables an attacker to craft malicious web requests that, when executed by a logged-in user, perform unauthorized actions on their behalf without their consent or knowledge. The affected versions include UIS4HOP1 600, 700, 800, and 900. The vulnerability does not impact confidentiality or availability but has a low impact on data integrity, as unauthorized changes to work center groups could be made. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and requires privileges of an authenticated user but no user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is classified under CWE-352, which corresponds to CSRF attacks that exploit the trust a web application places in the user's browser. Given the nature of SAP Fiori apps as critical enterprise resource planning (ERP) interfaces, this vulnerability could be leveraged to manipulate business process configurations or user group settings, potentially disrupting workflows or causing unauthorized changes in organizational resource management.
Potential Impact
For European organizations using SAP Fiori applications, particularly the Manage Work Center Groups app, this vulnerability poses a risk of unauthorized modification of work center group configurations. While it does not compromise sensitive data confidentiality or system availability, the integrity of business process configurations could be affected. This could lead to operational inefficiencies, misallocation of resources, or unauthorized privilege escalations within the SAP environment if attackers manipulate group memberships or permissions indirectly. Given SAP's widespread adoption across European industries such as manufacturing, logistics, and finance, even a low-integrity impact vulnerability can have cascading effects on business operations and compliance with regulatory frameworks like GDPR if improper access controls result. The requirement for an authenticated user to be tricked into executing the malicious request limits the attack surface but does not eliminate risk, especially in environments with many users and complex workflows. The absence of known exploits reduces immediate risk but does not preclude targeted attacks, especially from advanced persistent threat (APT) actors focusing on ERP systems.
Mitigation Recommendations
To mitigate CVE-2025-42923, European organizations should implement the following specific measures: 1) Apply SAP security patches promptly once released for the affected SAP Fiori app versions to ensure proper CSRF protections are enforced. 2) Enforce strict session management and implement additional CSRF tokens or double-submit cookie patterns in custom SAP Fiori app extensions or configurations. 3) Conduct user awareness training to reduce the risk of users being tricked into executing malicious requests, emphasizing cautious behavior with unsolicited links or embedded content. 4) Restrict SAP Fiori app access to trusted networks and use network segmentation to limit exposure of the SAP web interface. 5) Monitor SAP application logs for unusual or unauthorized changes to work center groups and implement anomaly detection to identify potential CSRF exploitation attempts. 6) Review and tighten user privileges to follow the principle of least privilege, minimizing the number of users with rights to modify work center groups. 7) Employ web application firewalls (WAFs) with rules tuned to detect and block CSRF attack patterns targeting SAP Fiori endpoints. These targeted mitigations go beyond generic advice by focusing on SAP-specific controls, user behavior, and network-level protections.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:32.384Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bf8dfad5a2966cfc85815c
Added to database: 9/9/2025, 2:16:26 AM
Last enriched: 9/9/2025, 2:33:07 AM
Last updated: 9/9/2025, 9:35:55 PM
Views: 5
Related Threats
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.