CVE-2025-42945: CWE-94: Improper Control of Generation of Code in SAP_SE SAP NetWeaver Application Server ABAP
SAP NetWeaver Application Server ABAP has HTML injection vulnerability. Due to this, an attacker could craft a URL with malicious script as payload and trick a victim with active user session into executing it. Upon successful exploit, this vulnerability could lead to limited access to data or its manipulation. There is no impact on availability.
AI Analysis
Technical Summary
CVE-2025-42945 is a medium-severity vulnerability affecting SAP NetWeaver Application Server ABAP versions KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, and 7.93. The vulnerability is classified under CWE-94, which relates to improper control of code generation. Specifically, this flaw manifests as an HTML injection vulnerability that allows an attacker to craft a malicious URL containing a script payload. When a victim with an active user session accesses this URL, the malicious script executes within their session context. This attack vector requires user interaction (clicking the crafted URL) but does not require any prior authentication or elevated privileges from the attacker. The vulnerability impacts confidentiality and integrity by enabling limited unauthorized data access or manipulation, but it does not affect system availability. The CVSS v3.1 base score is 6.1, reflecting a medium severity due to network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change. The vulnerability is notable because SAP NetWeaver Application Server ABAP is a critical enterprise application platform widely used for business process management and ERP functions. Exploiting this vulnerability could allow attackers to bypass security controls and manipulate or exfiltrate sensitive business data, potentially leading to financial loss or compliance violations. No known exploits are reported in the wild yet, and no official patches or mitigation links are provided at this time, indicating that organizations should prioritize monitoring and proactive defense measures.
Potential Impact
For European organizations, the impact of CVE-2025-42945 could be significant due to the widespread use of SAP NetWeaver in industries such as manufacturing, finance, telecommunications, and public sector entities. The ability to inject malicious scripts and manipulate data threatens the confidentiality and integrity of sensitive corporate and customer information, potentially leading to data breaches, fraud, or operational disruptions. Although availability is not affected, the loss of data integrity can undermine trust and compliance with regulations like GDPR. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing the risk in environments with less mature security awareness. Given SAP’s critical role in business operations, even limited data manipulation could cascade into broader business process failures or financial inaccuracies. European organizations must consider the regulatory and reputational consequences of such breaches, especially in sectors handling personal or financial data.
Mitigation Recommendations
Beyond standard patching once available, European organizations should implement several specific mitigations: 1) Enforce strict input validation and output encoding on all user-controllable inputs within SAP applications to prevent injection of malicious scripts. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious URL patterns or script payloads targeting SAP NetWeaver endpoints. 3) Conduct targeted user awareness training focused on recognizing and avoiding phishing attempts that could deliver malicious URLs exploiting this vulnerability. 4) Implement session management best practices, such as short session timeouts and multi-factor authentication, to reduce the window of opportunity for attackers leveraging active sessions. 5) Monitor SAP system logs and network traffic for anomalous activities indicative of exploitation attempts, including unusual URL requests or script execution traces. 6) Segment SAP infrastructure from general user networks to limit exposure and lateral movement. 7) Engage with SAP support channels to obtain patches or workarounds promptly and validate SAP security advisories regularly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-42945: CWE-94: Improper Control of Generation of Code in SAP_SE SAP NetWeaver Application Server ABAP
Description
SAP NetWeaver Application Server ABAP has HTML injection vulnerability. Due to this, an attacker could craft a URL with malicious script as payload and trick a victim with active user session into executing it. Upon successful exploit, this vulnerability could lead to limited access to data or its manipulation. There is no impact on availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-42945 is a medium-severity vulnerability affecting SAP NetWeaver Application Server ABAP versions KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, and 7.93. The vulnerability is classified under CWE-94, which relates to improper control of code generation. Specifically, this flaw manifests as an HTML injection vulnerability that allows an attacker to craft a malicious URL containing a script payload. When a victim with an active user session accesses this URL, the malicious script executes within their session context. This attack vector requires user interaction (clicking the crafted URL) but does not require any prior authentication or elevated privileges from the attacker. The vulnerability impacts confidentiality and integrity by enabling limited unauthorized data access or manipulation, but it does not affect system availability. The CVSS v3.1 base score is 6.1, reflecting a medium severity due to network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change. The vulnerability is notable because SAP NetWeaver Application Server ABAP is a critical enterprise application platform widely used for business process management and ERP functions. Exploiting this vulnerability could allow attackers to bypass security controls and manipulate or exfiltrate sensitive business data, potentially leading to financial loss or compliance violations. No known exploits are reported in the wild yet, and no official patches or mitigation links are provided at this time, indicating that organizations should prioritize monitoring and proactive defense measures.
Potential Impact
For European organizations, the impact of CVE-2025-42945 could be significant due to the widespread use of SAP NetWeaver in industries such as manufacturing, finance, telecommunications, and public sector entities. The ability to inject malicious scripts and manipulate data threatens the confidentiality and integrity of sensitive corporate and customer information, potentially leading to data breaches, fraud, or operational disruptions. Although availability is not affected, the loss of data integrity can undermine trust and compliance with regulations like GDPR. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing the risk in environments with less mature security awareness. Given SAP’s critical role in business operations, even limited data manipulation could cascade into broader business process failures or financial inaccuracies. European organizations must consider the regulatory and reputational consequences of such breaches, especially in sectors handling personal or financial data.
Mitigation Recommendations
Beyond standard patching once available, European organizations should implement several specific mitigations: 1) Enforce strict input validation and output encoding on all user-controllable inputs within SAP applications to prevent injection of malicious scripts. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious URL patterns or script payloads targeting SAP NetWeaver endpoints. 3) Conduct targeted user awareness training focused on recognizing and avoiding phishing attempts that could deliver malicious URLs exploiting this vulnerability. 4) Implement session management best practices, such as short session timeouts and multi-factor authentication, to reduce the window of opportunity for attackers leveraging active sessions. 5) Monitor SAP system logs and network traffic for anomalous activities indicative of exploitation attempts, including unusual URL requests or script execution traces. 6) Segment SAP infrastructure from general user networks to limit exposure and lateral movement. 7) Engage with SAP support channels to obtain patches or workarounds promptly and validate SAP security advisories regularly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:37.187Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689aa7d2ad5a09ad002be76e
Added to database: 8/12/2025, 2:32:50 AM
Last enriched: 8/12/2025, 2:51:09 AM
Last updated: 8/25/2025, 7:55:08 PM
Views: 21
Related Threats
CVE-2025-9419: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-57804: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in python-hyper h2
MediumCVE-2025-6188: 288 in Arista Networks EOS
HighCVE-2025-9417: SQL Injection in itsourcecode Apartment Management System
MediumCVE-2025-3456: CWE-532 Insertion of Sensitive Information into Log File in Arista Networks EOS
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.