Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)

0
Medium
VulnerabilityCVE-2025-42924cvecve-2025-42924cwe-601
Published: Tue Nov 11 2025 (11/11/2025, 00:20:31 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP S/4HANA landscape (SAP E-Recruiting BSP)

Description

SAP S/4HANA landscape SAP E-Recruiting BSP allows an unauthenticated attacker to craft malicious links, when clicked the victim could be redirected to the page controlled by the attacker. This has low impact on confidentiality and integrity of the application with no impact on availability.

AI-Powered Analysis

AILast updated: 11/11/2025, 01:00:33 UTC

Technical Analysis

CVE-2025-42924 identifies a URL redirection vulnerability (CWE-601) within the SAP E-Recruiting BSP component of the SAP S/4HANA landscape. This vulnerability allows an unauthenticated attacker to create specially crafted URLs that, upon user interaction, redirect victims to external websites controlled by the attacker. The flaw arises due to insufficient validation or sanitization of URL parameters that control redirection targets. Because the attacker does not require authentication, the attack surface is broad, relying solely on social engineering to entice users to click malicious links. The vulnerability affects a wide range of SAP E-Recruiting BSP versions, from 100 through 802, indicating long-term presence and potential exposure across many enterprise deployments. The impact on confidentiality and integrity is considered low because the vulnerability itself does not grant direct access to sensitive data or allow modification of application data. However, the redirection can facilitate phishing attacks, credential harvesting, or delivery of malware by redirecting users to malicious sites. Availability remains unaffected. The CVSS v3.1 score is 6.1 (medium severity), reflecting the network attack vector, no privileges required, user interaction needed, and partial impact on confidentiality and integrity. No known public exploits have been reported yet, but the vulnerability's nature makes it a candidate for phishing campaigns targeting SAP users. The vulnerability is particularly relevant for organizations relying on SAP E-Recruiting BSP for HR and recruitment processes, as attackers could leverage trust in these systems to increase the success of social engineering attacks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily through social engineering and phishing attacks that exploit trusted SAP E-Recruiting portals. Successful exploitation could lead to users being redirected to malicious sites designed to steal credentials, deploy malware, or conduct further attacks. Although the direct impact on SAP system confidentiality and integrity is low, compromised user credentials or session tokens could escalate into more severe breaches. Given the widespread use of SAP S/4HANA in Europe, especially in large enterprises and public sector organizations, the potential for targeted attacks is significant. The vulnerability could undermine user trust in SAP recruitment portals and disrupt HR operations if exploited at scale. Additionally, attackers could leverage this flaw to bypass some security controls by redirecting users away from legitimate SAP pages. The absence of availability impact means operational continuity is unlikely to be affected directly, but indirect consequences from successful phishing or malware infections could be severe. Overall, the threat increases the attack surface for social engineering campaigns against European enterprises using SAP E-Recruiting BSP.

Mitigation Recommendations

1. Apply official SAP patches and updates as soon as they become available for the affected SAP E-Recruiting BSP versions to remediate the vulnerability at the source. 2. Implement strict input validation and URL sanitization on all redirection parameters within SAP E-Recruiting BSP to ensure only trusted internal URLs are allowed. 3. Configure web application firewalls (WAFs) or reverse proxies to detect and block suspicious redirection attempts or URLs leading to untrusted domains. 4. Educate employees and users about the risks of clicking unsolicited or suspicious links, especially those purporting to be from HR or recruitment portals. 5. Employ email security solutions with phishing detection capabilities to reduce the likelihood of malicious URLs reaching end users. 6. Monitor SAP system logs and web traffic for unusual redirection patterns or spikes in external URL requests. 7. Consider implementing multi-factor authentication (MFA) on SAP portals to reduce the impact of credential theft resulting from phishing. 8. Regularly review and audit SAP E-Recruiting BSP configurations and customizations to identify and remediate insecure redirect implementations. 9. Collaborate with SAP support and security teams to stay informed about emerging threats and recommended best practices related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:32.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3c0c

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 11/11/2025, 1:00:33 AM

Last updated: 11/11/2025, 5:06:58 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats