CVE-2025-42937: CWE-35: Path Traversal in SAP_SE SAP Print Service
SAP Print Service (SAPSprint) performs insufficient validation of path information provided by users. An unauthenticated attacker could traverse to the parent directory and over-write system files causing high impact on confidentiality integrity and availability of the application.
AI Analysis
Technical Summary
CVE-2025-42937 is a path traversal vulnerability classified under CWE-35 affecting SAP SE's SAP Print Service (SAPSprint) versions 8.00 and 8.10. The vulnerability stems from insufficient validation of path inputs provided by users to the SAP Print Service, which is responsible for managing print jobs within SAP environments. An attacker can exploit this flaw without authentication by crafting malicious requests that include directory traversal sequences (e.g., ../) to access parent directories beyond the intended file system scope. This unauthorized traversal enables overwriting of critical system files, potentially leading to arbitrary code execution, data corruption, or denial of service. The vulnerability's CVSS 3.1 base score is 9.8, reflecting its critical nature due to network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but confidentiality, integrity, and availability impacts are all high (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable and dangerous. SAP Print Service is widely used in enterprise SAP deployments for printing and document management, making this vulnerability a significant threat vector. The lack of patches at the time of publication necessitates immediate risk mitigation strategies. The vulnerability was reserved in April 2025 and published in October 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the impact of CVE-2025-42937 is substantial due to the widespread use of SAP systems in critical sectors such as manufacturing, finance, telecommunications, and public administration. Successful exploitation could allow attackers to overwrite system files, leading to complete system compromise, data breaches, disruption of business operations, and potential regulatory non-compliance under GDPR due to loss of data confidentiality and integrity. The ability to execute attacks remotely without authentication increases the risk of automated exploitation campaigns targeting vulnerable SAP Print Service instances. This could result in ransomware deployment, espionage, or sabotage, severely affecting operational continuity and trust. The high availability impact could disrupt essential business processes, causing financial losses and reputational damage. Given the interconnected nature of SAP environments, lateral movement and further compromise within enterprise networks are also possible. The criticality of SAP systems in European industries amplifies the threat's severity, necessitating prioritized remediation and monitoring.
Mitigation Recommendations
1. Apply official SAP patches immediately once released for SAPSPRINT versions 8.00 and 8.10 to remediate the vulnerability. 2. Until patches are available, implement strict network segmentation to isolate SAP Print Service from untrusted networks and limit exposure to potential attackers. 3. Employ application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block directory traversal payloads targeting SAP Print Service endpoints. 4. Monitor file system integrity on SAP servers using host-based intrusion detection systems (HIDS) to detect unauthorized file modifications indicative of exploitation attempts. 5. Restrict access to SAP Print Service to trusted administrators and internal systems only, using network access controls and VPNs. 6. Conduct regular security audits and vulnerability scans focused on SAP environments to identify unpatched or misconfigured instances. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Review and harden SAP Print Service configurations to minimize attack surface, disabling unnecessary features or services where possible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-42937: CWE-35: Path Traversal in SAP_SE SAP Print Service
Description
SAP Print Service (SAPSprint) performs insufficient validation of path information provided by users. An unauthenticated attacker could traverse to the parent directory and over-write system files causing high impact on confidentiality integrity and availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-42937 is a path traversal vulnerability classified under CWE-35 affecting SAP SE's SAP Print Service (SAPSprint) versions 8.00 and 8.10. The vulnerability stems from insufficient validation of path inputs provided by users to the SAP Print Service, which is responsible for managing print jobs within SAP environments. An attacker can exploit this flaw without authentication by crafting malicious requests that include directory traversal sequences (e.g., ../) to access parent directories beyond the intended file system scope. This unauthorized traversal enables overwriting of critical system files, potentially leading to arbitrary code execution, data corruption, or denial of service. The vulnerability's CVSS 3.1 base score is 9.8, reflecting its critical nature due to network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but confidentiality, integrity, and availability impacts are all high (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable and dangerous. SAP Print Service is widely used in enterprise SAP deployments for printing and document management, making this vulnerability a significant threat vector. The lack of patches at the time of publication necessitates immediate risk mitigation strategies. The vulnerability was reserved in April 2025 and published in October 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the impact of CVE-2025-42937 is substantial due to the widespread use of SAP systems in critical sectors such as manufacturing, finance, telecommunications, and public administration. Successful exploitation could allow attackers to overwrite system files, leading to complete system compromise, data breaches, disruption of business operations, and potential regulatory non-compliance under GDPR due to loss of data confidentiality and integrity. The ability to execute attacks remotely without authentication increases the risk of automated exploitation campaigns targeting vulnerable SAP Print Service instances. This could result in ransomware deployment, espionage, or sabotage, severely affecting operational continuity and trust. The high availability impact could disrupt essential business processes, causing financial losses and reputational damage. Given the interconnected nature of SAP environments, lateral movement and further compromise within enterprise networks are also possible. The criticality of SAP systems in European industries amplifies the threat's severity, necessitating prioritized remediation and monitoring.
Mitigation Recommendations
1. Apply official SAP patches immediately once released for SAPSPRINT versions 8.00 and 8.10 to remediate the vulnerability. 2. Until patches are available, implement strict network segmentation to isolate SAP Print Service from untrusted networks and limit exposure to potential attackers. 3. Employ application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block directory traversal payloads targeting SAP Print Service endpoints. 4. Monitor file system integrity on SAP servers using host-based intrusion detection systems (HIDS) to detect unauthorized file modifications indicative of exploitation attempts. 5. Restrict access to SAP Print Service to trusted administrators and internal systems only, using network access controls and VPNs. 6. Conduct regular security audits and vulnerability scans focused on SAP environments to identify unpatched or misconfigured instances. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Review and harden SAP Print Service configurations to minimize attack surface, disabling unnecessary features or services where possible.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:34.582Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ed9e3ae121319cf76b7b52
Added to database: 10/14/2025, 12:50:02 AM
Last enriched: 10/14/2025, 1:04:47 AM
Last updated: 10/14/2025, 4:51:28 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
Critical⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
CriticalCVE-2025-42939: CWE-863: Incorrect Authorization in SAP_SE SAP S/4HANA (Manage Processing Rules - For Bank Statements)
MediumCVE-2025-42910: CWE-434: Unrestricted Upload of File with Dangerous Type in SAP_SE SAP Supplier Relationship Management
CriticalCVE-2025-42909: CWE-1004: Sensitive Cookie Without HttpOnly Flag in SAP_SE SAP Cloud Appliance Library Appliances
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.