CVE-2025-43000: CWE-862: Missing Authorization in SAP_SE SAP Business Objects Business Intelligence Platform (PMW)
Under certain conditions Promotion Management Wizard (PMW) allows an attacker to access information which would otherwise be restricted.This has High impact on Confidentiality with Low impact on Integrity and Availability of the application.
AI Analysis
Technical Summary
CVE-2025-43000 is a high-severity vulnerability affecting the SAP Business Objects Business Intelligence Platform, specifically the Promotion Management Wizard (PMW) component. The vulnerability is classified under CWE-862, which corresponds to missing authorization. This means that under certain conditions, the PMW allows an attacker with limited privileges (low privileges, requiring local access) to bypass authorization controls and access sensitive information that should otherwise be restricted. The vulnerability has a CVSS 3.1 base score of 7.9, indicating a high severity level. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system, but no user interaction is needed (UI:N). The attack complexity is low (AC:L), and privileges required are low (PR:L), meaning an attacker with limited access rights can exploit this flaw. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), meaning sensitive information disclosure is likely, while the impact on integrity and availability is low (I:L, A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions include SAP Business Objects Enterprise 430, 2025, and 2027 versions. This vulnerability could allow attackers to gain unauthorized access to confidential business intelligence data, potentially exposing sensitive corporate information, analytics, or reports that are critical for decision-making and competitive advantage.
Potential Impact
For European organizations using SAP Business Objects Business Intelligence Platform, this vulnerability poses a significant risk to the confidentiality of sensitive business data. Given the high impact on confidentiality, attackers could access proprietary analytics, financial reports, or other sensitive information that could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations (e.g., GDPR). Although the integrity and availability impacts are low, unauthorized data disclosure alone can have severe reputational and financial consequences. This risk is particularly acute for sectors heavily reliant on SAP BI platforms, such as manufacturing, finance, pharmaceuticals, and public sector entities across Europe. The need for only low privileges and local access means that insider threats or attackers who have gained limited footholds in the network could exploit this vulnerability to escalate data access. The absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediate review and restriction of access controls to the SAP Business Objects PMW component, ensuring that only fully trusted and necessary personnel have access. 2. Implement strict network segmentation and access controls to limit local access to SAP BI servers, reducing the risk of attackers gaining the required local privileges. 3. Monitor and audit user activities around the PMW component to detect any unauthorized access attempts or suspicious behavior. 4. Engage with SAP support channels to obtain patches or security updates as soon as they become available, and prioritize their deployment in affected environments. 5. Conduct a thorough security assessment of SAP BI deployments to identify any other potential authorization weaknesses. 6. Educate internal teams about the risk of privilege escalation and missing authorization vulnerabilities, emphasizing the importance of least privilege principles. 7. Consider deploying additional data loss prevention (DLP) controls around sensitive BI data to detect and prevent unauthorized exfiltration. 8. If possible, temporarily disable or restrict the use of the Promotion Management Wizard until a patch is applied or a secure configuration is confirmed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Switzerland
CVE-2025-43000: CWE-862: Missing Authorization in SAP_SE SAP Business Objects Business Intelligence Platform (PMW)
Description
Under certain conditions Promotion Management Wizard (PMW) allows an attacker to access information which would otherwise be restricted.This has High impact on Confidentiality with Low impact on Integrity and Availability of the application.
AI-Powered Analysis
Technical Analysis
CVE-2025-43000 is a high-severity vulnerability affecting the SAP Business Objects Business Intelligence Platform, specifically the Promotion Management Wizard (PMW) component. The vulnerability is classified under CWE-862, which corresponds to missing authorization. This means that under certain conditions, the PMW allows an attacker with limited privileges (low privileges, requiring local access) to bypass authorization controls and access sensitive information that should otherwise be restricted. The vulnerability has a CVSS 3.1 base score of 7.9, indicating a high severity level. The attack vector is local (AV:L), requiring the attacker to have some level of access to the system, but no user interaction is needed (UI:N). The attack complexity is low (AC:L), and privileges required are low (PR:L), meaning an attacker with limited access rights can exploit this flaw. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), meaning sensitive information disclosure is likely, while the impact on integrity and availability is low (I:L, A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions include SAP Business Objects Enterprise 430, 2025, and 2027 versions. This vulnerability could allow attackers to gain unauthorized access to confidential business intelligence data, potentially exposing sensitive corporate information, analytics, or reports that are critical for decision-making and competitive advantage.
Potential Impact
For European organizations using SAP Business Objects Business Intelligence Platform, this vulnerability poses a significant risk to the confidentiality of sensitive business data. Given the high impact on confidentiality, attackers could access proprietary analytics, financial reports, or other sensitive information that could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations (e.g., GDPR). Although the integrity and availability impacts are low, unauthorized data disclosure alone can have severe reputational and financial consequences. This risk is particularly acute for sectors heavily reliant on SAP BI platforms, such as manufacturing, finance, pharmaceuticals, and public sector entities across Europe. The need for only low privileges and local access means that insider threats or attackers who have gained limited footholds in the network could exploit this vulnerability to escalate data access. The absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Immediate review and restriction of access controls to the SAP Business Objects PMW component, ensuring that only fully trusted and necessary personnel have access. 2. Implement strict network segmentation and access controls to limit local access to SAP BI servers, reducing the risk of attackers gaining the required local privileges. 3. Monitor and audit user activities around the PMW component to detect any unauthorized access attempts or suspicious behavior. 4. Engage with SAP support channels to obtain patches or security updates as soon as they become available, and prioritize their deployment in affected environments. 5. Conduct a thorough security assessment of SAP BI deployments to identify any other potential authorization weaknesses. 6. Educate internal teams about the risk of privilege escalation and missing authorization vulnerabilities, emphasizing the importance of least privilege principles. 7. Consider deploying additional data loss prevention (DLP) controls around sensitive BI data to detect and prevent unauthorized exfiltration. 8. If possible, temporarily disable or restrict the use of the Promotion Management Wizard until a patch is applied or a secure configuration is confirmed.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- sap
- Date Reserved
- 2025-04-16T13:25:50.942Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd64c4
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/12/2025, 1:46:53 AM
Last updated: 7/31/2025, 1:58:19 AM
Views: 17
Related Threats
Top Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.