Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42950: CWE-94: Improper Control of Generation of Code in SAP_SE SAP Landscape Transformation (Analysis Platform)

0
Critical
VulnerabilityCVE-2025-42950cvecve-2025-42950cwe-94
Published: Tue Aug 12 2025 (08/12/2025, 02:08:36 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP Landscape Transformation (Analysis Platform)

Description

SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:06:09 UTC

Technical Analysis

CVE-2025-42950 is a critical code injection vulnerability classified under CWE-94, affecting SAP Landscape Transformation (SLT), an analysis platform used for real-time data replication and transformation in SAP environments. The vulnerability resides in a function module exposed via Remote Function Call (RFC) interfaces, which are commonly used for inter-system communication in SAP landscapes. An attacker possessing valid user privileges can exploit this flaw to inject arbitrary ABAP code into the system. This injection bypasses essential authorization checks, which normally restrict code execution privileges, effectively creating a backdoor within the SAP system. The injected code can execute with elevated privileges, enabling the attacker to manipulate data, disrupt operations, or gain persistent control over the system. The affected versions include multiple releases from DMIS 2011_1_700 through 2020, indicating a broad impact across several SAP SLT deployments. The vulnerability has a CVSS 3.1 base score of 9.9, reflecting its critical nature, with network attack vector, low attack complexity, and requiring only privileges but no user interaction. The scope is changed, meaning the vulnerability affects components beyond the initially compromised user context. Although no exploits have been reported in the wild yet, the potential for severe damage is high given the nature of SAP systems as enterprise backbones. The vulnerability undermines confidentiality, integrity, and availability of data and services, posing a significant risk to organizations relying on SAP SLT for data transformation and replication.

Potential Impact

The impact of CVE-2025-42950 is severe for organizations worldwide that utilize SAP Landscape Transformation. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code with elevated privileges. This can result in unauthorized data access, data manipulation, disruption of business processes, and potential lateral movement within the enterprise network. Given SAP's critical role in enterprise resource planning (ERP), finance, supply chain, and other core business functions, a successful attack could cause significant operational downtime, financial loss, regulatory non-compliance, and reputational damage. The vulnerability's ability to bypass authorization checks increases the risk of insider threats or compromised user accounts being leveraged for attacks. The broad range of affected versions means many organizations may be exposed, especially those with delayed patching cycles. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity score indicates that exploitation would have devastating consequences.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the vulnerable RFC function modules by implementing strict authorization checks and network-level segmentation to limit exposure. 2. Monitor SAP system logs and RFC call activity for unusual or unauthorized code execution attempts. 3. Apply SAP security notes and patches as soon as they are released by SAP for the affected SLT versions. 4. Enforce the principle of least privilege by reviewing and minimizing user privileges, especially for accounts with RFC access. 5. Implement multi-factor authentication (MFA) for SAP user accounts to reduce the risk of credential compromise. 6. Conduct regular security audits and vulnerability assessments focused on SAP environments to detect misconfigurations or unauthorized changes. 7. Employ runtime application self-protection (RASP) or SAP-specific security tools that can detect and block abnormal ABAP code execution. 8. Establish incident response plans tailored to SAP system compromises to enable rapid containment and recovery. 9. Educate SAP administrators and users about the risks of this vulnerability and best practices for secure SAP operations. These steps go beyond generic advice by focusing on SAP-specific controls, proactive monitoring, and rapid patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:37.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d2ad5a09ad002be788

Added to database: 8/12/2025, 2:32:50 AM

Last enriched: 2/27/2026, 2:06:09 AM

Last updated: 3/23/2026, 11:13:51 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses