Skip to main content

CVE-2025-42945: CWE-94: Improper Control of Generation of Code in SAP_SE SAP NetWeaver Application Server ABAP

Medium
VulnerabilityCVE-2025-42945cvecve-2025-42945cwe-94
Published: Tue Aug 12 2025 (08/12/2025, 02:05:51 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server ABAP

Description

SAP NetWeaver Application Server ABAP has HTML injection vulnerability. Due to this, an attacker could craft a URL with malicious script as payload and trick a victim with active user session into executing it. Upon successful exploit, this vulnerability could lead to limited access to data or its manipulation. There is no impact on availability.

AI-Powered Analysis

AILast updated: 08/12/2025, 02:51:09 UTC

Technical Analysis

CVE-2025-42945 is a medium-severity vulnerability affecting SAP NetWeaver Application Server ABAP versions KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, and 7.93. The vulnerability is classified under CWE-94, which relates to improper control of code generation. Specifically, this flaw manifests as an HTML injection vulnerability that allows an attacker to craft a malicious URL containing a script payload. When a victim with an active user session accesses this URL, the malicious script executes within their session context. This attack vector requires user interaction (clicking the crafted URL) but does not require any prior authentication or elevated privileges from the attacker. The vulnerability impacts confidentiality and integrity by enabling limited unauthorized data access or manipulation, but it does not affect system availability. The CVSS v3.1 base score is 6.1, reflecting a medium severity due to network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change. The vulnerability is notable because SAP NetWeaver Application Server ABAP is a critical enterprise application platform widely used for business process management and ERP functions. Exploiting this vulnerability could allow attackers to bypass security controls and manipulate or exfiltrate sensitive business data, potentially leading to financial loss or compliance violations. No known exploits are reported in the wild yet, and no official patches or mitigation links are provided at this time, indicating that organizations should prioritize monitoring and proactive defense measures.

Potential Impact

For European organizations, the impact of CVE-2025-42945 could be significant due to the widespread use of SAP NetWeaver in industries such as manufacturing, finance, telecommunications, and public sector entities. The ability to inject malicious scripts and manipulate data threatens the confidentiality and integrity of sensitive corporate and customer information, potentially leading to data breaches, fraud, or operational disruptions. Although availability is not affected, the loss of data integrity can undermine trust and compliance with regulations like GDPR. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing the risk in environments with less mature security awareness. Given SAP’s critical role in business operations, even limited data manipulation could cascade into broader business process failures or financial inaccuracies. European organizations must consider the regulatory and reputational consequences of such breaches, especially in sectors handling personal or financial data.

Mitigation Recommendations

Beyond standard patching once available, European organizations should implement several specific mitigations: 1) Enforce strict input validation and output encoding on all user-controllable inputs within SAP applications to prevent injection of malicious scripts. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious URL patterns or script payloads targeting SAP NetWeaver endpoints. 3) Conduct targeted user awareness training focused on recognizing and avoiding phishing attempts that could deliver malicious URLs exploiting this vulnerability. 4) Implement session management best practices, such as short session timeouts and multi-factor authentication, to reduce the window of opportunity for attackers leveraging active sessions. 5) Monitor SAP system logs and network traffic for anomalous activities indicative of exploitation attempts, including unusual URL requests or script execution traces. 6) Segment SAP infrastructure from general user networks to limit exposure and lateral movement. 7) Engage with SAP support channels to obtain patches or workarounds promptly and validate SAP security advisories regularly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:37.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d2ad5a09ad002be76e

Added to database: 8/12/2025, 2:32:50 AM

Last enriched: 8/12/2025, 2:51:09 AM

Last updated: 8/25/2025, 7:55:08 PM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats