Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42937: CWE-35: Path Traversal in SAP_SE SAP Print Service

0
Critical
VulnerabilityCVE-2025-42937cvecve-2025-42937cwe-35
Published: Tue Oct 14 2025 (10/14/2025, 00:18:31 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Print Service

Description

SAP Print Service (SAPSprint) performs insufficient validation of path information provided by users. An unauthenticated attacker could traverse to the parent directory and over-write system files causing high impact on confidentiality integrity and availability of the application.

AI-Powered Analysis

AILast updated: 10/21/2025, 04:40:40 UTC

Technical Analysis

CVE-2025-42937 is a critical security vulnerability classified under CWE-35 (Path Traversal) affecting SAP SE's SAP Print Service (SAPSprint) versions 8.00 and 8.10. The vulnerability arises from insufficient validation of user-supplied path information, allowing an unauthenticated attacker to traverse directories beyond the intended scope. By exploiting this flaw, an attacker can overwrite arbitrary system files, potentially leading to full compromise of the SAP Print Service environment. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The impact spans confidentiality, integrity, and availability, as attackers can modify critical files, disrupt printing services, or inject malicious code. The CVSS v3.1 base score of 9.8 reflects the critical nature, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it a prime target for exploitation once weaponized. SAP Print Service is widely used in enterprise environments for managing print jobs within SAP applications, making this vulnerability particularly concerning for organizations relying on SAP infrastructure. The lack of available patches at the time of publication necessitates immediate risk mitigation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-42937 is substantial. SAP systems are integral to many large enterprises, especially in manufacturing, finance, logistics, and public sectors across Europe. Exploitation could lead to unauthorized access and modification of sensitive business data, disruption of critical printing services, and potential lateral movement within corporate networks. This could result in operational downtime, financial losses, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and reputational damage. The ability to overwrite system files without authentication increases the risk of persistent backdoors or ransomware deployment. Given the criticality of SAP systems in European supply chains and government operations, the vulnerability poses a systemic risk that could affect multiple sectors simultaneously.

Mitigation Recommendations

1. Immediate Actions: Monitor SAP SE advisories for official patches or updates addressing CVE-2025-42937 and apply them promptly once available. 2. Network Segmentation: Restrict access to SAP Print Service endpoints to trusted internal networks only, using firewalls and network access controls to minimize exposure. 3. Input Validation Controls: Implement additional validation and filtering at network or application layers to detect and block suspicious path traversal attempts targeting SAP Print Service. 4. Logging and Monitoring: Enable detailed logging of SAP Print Service activities and monitor for anomalous file access patterns or unauthorized file modifications. 5. Incident Response Preparation: Develop and test incident response plans specific to SAP infrastructure compromise scenarios. 6. Least Privilege: Ensure SAP Print Service runs with minimal privileges necessary to limit the impact of potential exploitation. 7. Vendor Engagement: Engage with SAP support and security teams for guidance and early access to patches or mitigations. 8. Backup and Recovery: Maintain up-to-date backups of critical SAP system files and configurations to enable rapid restoration in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:34.582Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ed9e3ae121319cf76b7b52

Added to database: 10/14/2025, 12:50:02 AM

Last enriched: 10/21/2025, 4:40:40 AM

Last updated: 12/3/2025, 4:10:30 AM

Views: 429

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats