Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42957: CWE-94: Improper Control of Generation of Code in SAP_SE SAP S/4HANA (Private Cloud or On-Premise)

0
Critical
VulnerabilityCVE-2025-42957cvecve-2025-42957cwe-94
Published: Tue Aug 12 2025 (08/12/2025, 02:09:53 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP S/4HANA (Private Cloud or On-Premise)

Description

SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:06:43 UTC

Technical Analysis

CVE-2025-42957 is a critical code injection vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting SAP S/4HANA Private Cloud and On-Premise deployments, specifically versions S4CORE 102 through 108. The vulnerability resides in a function module exposed via Remote Function Call (RFC) interfaces, which are commonly used for communication and integration within SAP environments. An attacker possessing legitimate user privileges can exploit this flaw to inject arbitrary ABAP code into the system. Crucially, this injection bypasses essential authorization checks, effectively creating a backdoor that allows the attacker to execute unauthorized code with potentially elevated privileges. This can lead to full system compromise, including unauthorized data access, data manipulation, and disruption of system availability. The vulnerability has a CVSS v3.1 base score of 9.9, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits have been observed in the wild yet, the severity and ease of exploitation make it a significant threat. SAP environments often serve as critical enterprise resource planning backbones, making this vulnerability particularly dangerous. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to reduce risk.

Potential Impact

The impact of CVE-2025-42957 is severe for organizations worldwide that rely on SAP S/4HANA for critical business operations. Exploitation can lead to complete system compromise, allowing attackers to execute arbitrary ABAP code, which can result in unauthorized data disclosure, data tampering, and disruption or destruction of business processes. This undermines the confidentiality, integrity, and availability of sensitive enterprise data and systems. Given SAP's central role in financial, supply chain, human resources, and operational management, a successful attack could cause significant financial losses, regulatory penalties, reputational damage, and operational downtime. The vulnerability's ability to bypass authorization checks means even users with limited privileges can escalate their access, increasing the attack surface. Additionally, the network-exploitable nature of the flaw means attackers can launch attacks remotely without user interaction, raising the risk of widespread exploitation in unpatched environments. Organizations in sectors such as manufacturing, finance, healthcare, and government, which heavily depend on SAP, face heightened risks.

Mitigation Recommendations

To mitigate CVE-2025-42957, organizations should immediately audit and restrict user privileges, ensuring that only trusted users have access to RFC interfaces and function modules. Implement strict access controls and network segmentation to limit exposure of SAP RFC endpoints to untrusted networks. Monitor SAP system logs and ABAP code execution for unusual or unauthorized activity indicative of code injection attempts. Employ SAP's security notes and advisories as soon as patches or official mitigations become available. Until patches are released, consider disabling or restricting the vulnerable function modules if feasible, or applying SAP recommended temporary workarounds. Conduct thorough penetration testing and vulnerability assessments focused on SAP environments to identify potential exploitation paths. Enhance incident response readiness by preparing playbooks specific to SAP code injection and unauthorized access scenarios. Regularly update and harden SAP systems following best practices, including applying the principle of least privilege and continuous monitoring of SAP user activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:39.583Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689aa7d2ad5a09ad002be794

Added to database: 8/12/2025, 2:32:50 AM

Last enriched: 2/27/2026, 2:06:43 AM

Last updated: 3/25/2026, 3:00:25 AM

Views: 253

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses