Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42945: CWE-94: Improper Control of Generation of Code in SAP_SE SAP NetWeaver Application Server ABAP

0
Medium
VulnerabilityCVE-2025-42945cvecve-2025-42945cwe-94
Published: Tue Aug 12 2025 (08/12/2025, 02:05:51 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server ABAP

Description

SAP NetWeaver Application Server ABAP has HTML injection vulnerability. Due to this, an attacker could craft a URL with malicious script as payload and trick a victim with active user session into executing it. Upon successful exploit, this vulnerability could lead to limited access to data or its manipulation. There is no impact on availability.

AI-Powered Analysis

AILast updated: 08/12/2025, 02:51:09 UTC

Technical Analysis

CVE-2025-42945 is a medium-severity vulnerability affecting SAP NetWeaver Application Server ABAP versions KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, and 7.93. The vulnerability is classified under CWE-94, which relates to improper control of code generation. Specifically, this flaw manifests as an HTML injection vulnerability that allows an attacker to craft a malicious URL containing a script payload. When a victim with an active user session accesses this URL, the malicious script executes within their session context. This attack vector requires user interaction (clicking the crafted URL) but does not require any prior authentication or elevated privileges from the attacker. The vulnerability impacts confidentiality and integrity by enabling limited unauthorized data access or manipulation, but it does not affect system availability. The CVSS v3.1 base score is 6.1, reflecting a medium severity due to network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change. The vulnerability is notable because SAP NetWeaver Application Server ABAP is a critical enterprise application platform widely used for business process management and ERP functions. Exploiting this vulnerability could allow attackers to bypass security controls and manipulate or exfiltrate sensitive business data, potentially leading to financial loss or compliance violations. No known exploits are reported in the wild yet, and no official patches or mitigation links are provided at this time, indicating that organizations should prioritize monitoring and proactive defense measures.

Potential Impact

For European organizations, the impact of CVE-2025-42945 could be significant due to the widespread use of SAP NetWeaver in industries such as manufacturing, finance, telecommunications, and public sector entities. The ability to inject malicious scripts and manipulate data threatens the confidentiality and integrity of sensitive corporate and customer information, potentially leading to data breaches, fraud, or operational disruptions. Although availability is not affected, the loss of data integrity can undermine trust and compliance with regulations like GDPR. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing the risk in environments with less mature security awareness. Given SAP’s critical role in business operations, even limited data manipulation could cascade into broader business process failures or financial inaccuracies. European organizations must consider the regulatory and reputational consequences of such breaches, especially in sectors handling personal or financial data.

Mitigation Recommendations

Beyond standard patching once available, European organizations should implement several specific mitigations: 1) Enforce strict input validation and output encoding on all user-controllable inputs within SAP applications to prevent injection of malicious scripts. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious URL patterns or script payloads targeting SAP NetWeaver endpoints. 3) Conduct targeted user awareness training focused on recognizing and avoiding phishing attempts that could deliver malicious URLs exploiting this vulnerability. 4) Implement session management best practices, such as short session timeouts and multi-factor authentication, to reduce the window of opportunity for attackers leveraging active sessions. 5) Monitor SAP system logs and network traffic for anomalous activities indicative of exploitation attempts, including unusual URL requests or script execution traces. 6) Segment SAP infrastructure from general user networks to limit exposure and lateral movement. 7) Engage with SAP support channels to obtain patches or workarounds promptly and validate SAP security advisories regularly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:37.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d2ad5a09ad002be76e

Added to database: 8/12/2025, 2:32:50 AM

Last enriched: 8/12/2025, 2:51:09 AM

Last updated: 10/18/2025, 3:36:49 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats