Skip to main content

CVE-2025-42981: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP NetWeaver Application Server ABAP

Medium
VulnerabilityCVE-2025-42981cvecve-2025-42981cwe-601
Published: Tue Jul 08 2025 (07/08/2025, 00:38:16 UTC)
Source: CVE Database V5
Vendor/Project: SAP_SE
Product: SAP NetWeaver Application Server ABAP

Description

Due to an open redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft a URL link embedding a malicious script at a location not properly sanitized. When a victim clicks on this link, the script executes within the victim's browser, redirecting them to a site controlled by the attacker. This allows the attacker to access and/or modify restricted information related to the web client. While the vulnerability poses no impact on data availability, it presents a considerable risk to confidentiality and integrity.

AI-Powered Analysis

AILast updated: 07/08/2025, 00:56:11 UTC

Technical Analysis

CVE-2025-42981 is an open redirect vulnerability identified in SAP NetWeaver Application Server ABAP, specifically affecting multiple SAP_BASIS versions ranging from 700 through 816. The vulnerability arises due to improper sanitization of URLs, allowing an unauthenticated attacker to craft malicious URLs embedding scripts that, when clicked by a victim, execute within the victim's browser context. This execution results in the victim being redirected to an attacker-controlled site. The vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site). While it does not affect system availability, it poses significant risks to confidentiality and integrity by enabling attackers to potentially access or modify restricted information related to the web client session. The vulnerability has a CVSS v3.1 base score of 6.1, indicating a medium severity level. Exploitation requires no privileges but does require user interaction (clicking the malicious link). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. No known exploits are reported in the wild yet, and no patches are currently linked, suggesting organizations should prioritize mitigation proactively. This vulnerability is particularly concerning in environments where SAP NetWeaver is exposed to external users or where phishing attacks could be leveraged to trick users into clicking malicious links.

Potential Impact

For European organizations, the impact of CVE-2025-42981 can be significant, especially for enterprises relying heavily on SAP NetWeaver Application Server ABAP for critical business processes. The vulnerability enables attackers to redirect users to malicious sites, potentially leading to credential theft, session hijacking, or further exploitation via social engineering. Confidential business data accessible through the web client could be exposed or altered, undermining data integrity and confidentiality. Although availability is not directly impacted, the breach of trust and data compromise can result in regulatory non-compliance, reputational damage, and financial losses. Given the widespread use of SAP systems in Europe across sectors like manufacturing, finance, and public administration, this vulnerability could be exploited to target sensitive information or disrupt business operations indirectly. The requirement for user interaction means phishing campaigns could be a likely attack vector, increasing risk in organizations with less mature security awareness programs.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Immediately audit SAP NetWeaver Application Server ABAP versions in use and identify those affected by this vulnerability. 2) Monitor SAP Security Notes and vendor advisories for official patches or hotfixes and apply them promptly once available. 3) Implement web application firewall (WAF) rules to detect and block suspicious URL redirection patterns and malformed requests targeting SAP web clients. 4) Enhance email security controls to filter phishing attempts that may deliver malicious URLs exploiting this vulnerability. 5) Conduct user awareness training focused on recognizing and avoiding suspicious links, emphasizing the risks of URL redirection attacks. 6) Review and tighten SAP web client configurations to restrict open redirects and validate URL parameters rigorously. 7) Employ browser security features such as Content Security Policy (CSP) to limit script execution from untrusted sources. 8) Regularly monitor logs for unusual redirect activities or access patterns indicative of exploitation attempts. These steps collectively reduce the attack surface and mitigate the risk until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:45.231Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686c68cd6f40f0eb72eec691

Added to database: 7/8/2025, 12:39:41 AM

Last enriched: 7/8/2025, 12:56:11 AM

Last updated: 8/22/2025, 7:53:54 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats