Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-42999: CWE-502: Deserialization of Untrusted Data in SAP_SE SAP NetWeaver (Visual Composer development server)

0
Critical
VulnerabilityCVE-2025-42999cvecve-2025-42999cwe-502
Published: Tue May 13 2025 (05/13/2025, 00:17:43 UTC)
Source: CVE
Vendor/Project: SAP_SE
Product: SAP NetWeaver (Visual Composer development server)

Description

SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:33:51 UTC

Technical Analysis

CVE-2025-42999 is a critical security vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting SAP NetWeaver Visual Composer development server, specifically version VCFRAMEWORK 7.50. The vulnerability arises when a privileged user uploads serialized metadata content to the Visual Composer Metadata Uploader component. If the uploaded content is malicious or crafted to exploit the deserialization process, it can lead to arbitrary code execution or other malicious outcomes on the host system. Deserialization vulnerabilities occur when untrusted data is processed without proper validation or sanitization, allowing attackers to manipulate the deserialization logic to execute unintended commands or corrupt system state. In this case, the vulnerability impacts confidentiality, integrity, and availability, potentially allowing attackers to access sensitive data, alter system configurations, or disrupt services. The CVSS 3.1 score of 9.1 indicates a network attack vector with low complexity, requiring high privileges but no user interaction, and with a scope change affecting components beyond the vulnerable module. Although no public exploits are currently known, the critical nature of the flaw and the widespread use of SAP NetWeaver in enterprise environments make this a significant threat. The absence of patch links suggests that a fix may still be pending or in development, emphasizing the need for immediate risk mitigation and monitoring.

Potential Impact

The impact of CVE-2025-42999 is severe for organizations using SAP NetWeaver Visual Composer, especially those running version 7.50. Successful exploitation can lead to full system compromise, including unauthorized access to sensitive business data, modification or deletion of critical information, and disruption of business operations due to system downtime or instability. Given SAP's role in managing enterprise resource planning (ERP), supply chain, and financial systems, exploitation could have cascading effects on business continuity, regulatory compliance, and financial integrity. Attackers with high privileges could leverage this vulnerability to establish persistent backdoors, move laterally within the network, or exfiltrate confidential data. The vulnerability's network accessibility further increases the risk of remote exploitation, potentially by insider threats or compromised privileged accounts. Organizations in sectors such as manufacturing, finance, healthcare, and government, which heavily depend on SAP systems, may face significant operational and reputational damage if targeted.

Mitigation Recommendations

To mitigate CVE-2025-42999, organizations should implement the following specific measures: 1) Immediately audit and restrict privileged user accounts with upload capabilities in SAP NetWeaver Visual Composer to the minimum necessary personnel. 2) Implement strict input validation and sanitization controls on all uploaded metadata content to detect and block malicious serialized objects. 3) Monitor logs and network traffic for unusual upload activity or deserialization errors indicative of exploitation attempts. 4) Employ application-layer firewalls or SAP-specific security modules that can detect and prevent deserialization attacks. 5) Segregate SAP development and production environments to limit the impact of potential exploitation. 6) Stay in close contact with SAP for official patches or security advisories and apply updates promptly once available. 7) Conduct regular security assessments and penetration testing focusing on deserialization vulnerabilities within SAP components. 8) Educate privileged users about the risks of uploading untrusted content and enforce strict operational procedures. These targeted actions go beyond generic advice by focusing on controlling the upload vector, enhancing detection, and limiting privilege exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2025-04-16T13:25:50.942Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb8c2

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/26/2026, 9:33:51 PM

Last updated: 3/22/2026, 9:28:41 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses