Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)

0
Medium
VulnerabilityCVE-2025-42924cvecve-2025-42924cwe-601
Published: Tue Nov 11 2025 (11/11/2025, 00:20:31 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP S/4HANA landscape (SAP E-Recruiting BSP)

Description

SAP S/4HANA landscape SAP E-Recruiting BSP allows an unauthenticated attacker to craft malicious links, when clicked the victim could be redirected to the page controlled by the attacker. This has low impact on confidentiality and integrity of the application with no impact on availability.

AI-Powered Analysis

AILast updated: 11/18/2025, 05:43:16 UTC

Technical Analysis

CVE-2025-42924 identifies a URL redirection vulnerability (CWE-601) in the SAP S/4HANA landscape, specifically within the SAP E-Recruiting BSP component. This vulnerability enables an unauthenticated attacker to craft specially crafted URLs that, when clicked by a victim, redirect them to external sites controlled by the attacker. The vulnerability arises due to insufficient validation or sanitization of URL parameters that control redirection targets. Exploiting this flaw requires no authentication but does require user interaction, such as clicking a malicious link delivered via email or other means. The vulnerability affects a broad range of SAP E-Recruiting BSP versions, including S4ERECRT 100 through 802 and ERECRUIT versions 600 through 617. The CVSS v3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but user interaction needed, and impacts on confidentiality and integrity but not availability. The primary risk is that attackers can use this redirection to facilitate phishing attacks, redirect users to malicious websites hosting malware or credential harvesting pages, or otherwise deceive users. While the vulnerability itself does not directly compromise SAP system data or availability, it can be a stepping stone in broader social engineering or multi-stage attacks. No public exploits or active exploitation have been reported to date. The vulnerability was reserved in April 2025 and published in November 2025, indicating recent discovery and disclosure. The lack of patch links suggests that SAP may not yet have released an official fix, so organizations must rely on interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing campaigns leveraging trusted SAP E-Recruiting URLs. Given the widespread use of SAP S/4HANA in large enterprises across Europe, especially in sectors like manufacturing, finance, and public administration, attackers could exploit this flaw to redirect employees or job applicants to malicious sites. This could lead to credential theft, malware infections, or reputational damage if users are compromised via these redirects. Although the direct impact on SAP system confidentiality and integrity is low, the indirect consequences through user compromise can be significant. The vulnerability does not affect system availability, so operational disruption is unlikely. However, the potential for targeted phishing attacks exploiting trusted SAP URLs is a concern, especially in countries with high SAP adoption and where SAP E-Recruiting is actively used for talent acquisition. Organizations handling sensitive personal data in recruitment processes must be vigilant to prevent data leakage or fraud stemming from redirected users.

Mitigation Recommendations

To mitigate CVE-2025-42924, European organizations should implement multiple layers of defense. First, monitor SAP security advisories closely and apply patches or updates from SAP as soon as they become available. In the absence of official patches, implement URL validation and filtering at the web application firewall (WAF) or proxy level to block suspicious redirection attempts. Educate employees and recruitment staff about the risks of clicking unsolicited or suspicious links, especially those purporting to be from SAP E-Recruiting portals. Employ email security solutions that detect and quarantine phishing attempts leveraging malicious URLs. Review and harden SAP E-Recruiting BSP configurations to restrict open redirect parameters if configurable. Enable logging and monitoring of redirection events within SAP to detect anomalous patterns. Consider implementing multi-factor authentication (MFA) for SAP access to reduce the impact of credential theft. Finally, conduct regular security awareness training focused on social engineering and phishing threats related to trusted enterprise applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:32.384Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912870814bc3e00ba6f3c0c

Added to database: 11/11/2025, 12:44:56 AM

Last enriched: 11/18/2025, 5:43:16 AM

Last updated: 12/26/2025, 2:24:04 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats