Skip to main content

CVE-2025-42957: CWE-94: Improper Control of Generation of Code in SAP_SE SAP S/4HANA (Private Cloud or On-Premise)

Critical
VulnerabilityCVE-2025-42957cvecve-2025-42957cwe-94
Published: Tue Aug 12 2025 (08/12/2025, 02:09:53 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP S/4HANA (Private Cloud or On-Premise)

Description

SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.

AI-Powered Analysis

AILast updated: 08/12/2025, 02:48:09 UTC

Technical Analysis

CVE-2025-42957 is a critical vulnerability affecting SAP S/4HANA systems, specifically versions S4CORE 102 through 108, deployed in private cloud or on-premise environments. The vulnerability stems from improper control over code generation (CWE-94) within a function module exposed via Remote Function Call (RFC). An attacker with legitimate user privileges can exploit this flaw to inject arbitrary ABAP code into the SAP system. This injection bypasses essential authorization checks, effectively creating a backdoor that allows the attacker to execute unauthorized commands and potentially take full control of the system. The vulnerability impacts confidentiality, integrity, and availability, as the attacker can manipulate sensitive data, alter system behavior, and disrupt operations. The CVSS v3.1 base score is 9.9, reflecting the ease of remote exploitation (network vector), low attack complexity, requirement of only low privileges (PR:L), no user interaction, and a scope change that affects components beyond the initially vulnerable module. Although no known exploits are currently observed in the wild, the severity and nature of this vulnerability make it a prime target for attackers aiming to compromise enterprise resource planning (ERP) systems. SAP S/4HANA is a critical backbone for many organizations' business processes, making this vulnerability particularly dangerous.

Potential Impact

For European organizations, the impact of CVE-2025-42957 is substantial. SAP S/4HANA is widely used across industries such as manufacturing, finance, logistics, and public sector entities throughout Europe. Exploitation could lead to unauthorized access to highly sensitive business data, including financial records, personal data protected under GDPR, and intellectual property. The ability to inject arbitrary code and bypass authorization controls threatens the integrity of business processes and could enable fraudulent transactions, data manipulation, or sabotage. Availability could also be compromised, resulting in operational downtime and significant financial losses. Given the critical role of SAP systems in supply chain management and regulatory reporting, exploitation could disrupt compliance efforts and damage organizational reputation. Furthermore, the cross-border nature of many European enterprises means that a successful attack could have cascading effects across multiple countries and sectors.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate application of SAP-provided patches or security notes once available, as no official patches are currently linked but are expected given the critical severity. 2) Restrict and closely monitor RFC access, limiting it to only trusted users and systems, and enforce the principle of least privilege rigorously. 3) Implement enhanced logging and real-time monitoring of ABAP code execution and changes, with alerts for anomalous or unauthorized code injections. 4) Conduct thorough audits of user privileges and remove or downgrade unnecessary elevated rights, especially for users with RFC access. 5) Employ network segmentation to isolate SAP systems from less secure network zones, reducing exposure to potential attackers. 6) Use SAP’s security tools such as SAP Enterprise Threat Detection to identify suspicious activities early. 7) Educate administrators and security teams about this vulnerability to ensure rapid detection and response. 8) Consider deploying application-level firewalls or SAP-specific security modules that can detect and block suspicious RFC calls or code injection attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:39.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d2ad5a09ad002be794

Added to database: 8/12/2025, 2:32:50 AM

Last enriched: 8/12/2025, 2:48:09 AM

Last updated: 8/12/2025, 12:28:36 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats