CVE-2025-0054

5.4 MEDIUM

📋 TL;DR

SAP NetWeaver Application Server Java has a stored cross-site scripting vulnerability where attackers with basic user privileges can inject malicious JavaScript that executes in other users' browsers. This allows attackers to read or modify information on vulnerable web pages. Organizations running affected SAP NetWeaver Java systems are impacted.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server Java
Versions: Specific versions not provided in CVE description; check SAP Note 3526203 for details
Operating Systems: All supported OS for SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have basic user privileges; affects web interfaces of SAP NetWeaver Java applications

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, deface web interfaces, or redirect users to malicious sites, potentially leading to data theft or unauthorized system access.

🟠

Likely Case

Attackers with basic user access inject malicious scripts that execute when other users view affected pages, enabling session hijacking, data theft, or limited privilege escalation within the application.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability is prevented, maintaining normal application functionality without security risks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access; stored XSS typically has low exploitation complexity once payload is crafted

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3526203 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3526203

Restart Required: Yes

Instructions:

1. Review SAP Note 3526203 for specific patch details
2. Apply the SAP Security Patch Day updates for your NetWeaver Java version
3. Restart affected SAP NetWeaver Java instances
4. Test application functionality post-patch

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement server-side input validation and proper output encoding for user-controlled data

Content Security Policy

all

Implement Content Security Policy headers to restrict script execution sources

🧯 If You Can't Patch

  • Implement web application firewall rules to block XSS payloads
  • Restrict user privileges to minimize attack surface

🔍 How to Verify

Check if Vulnerable:

Check SAP system version against affected versions in SAP Note 3526203; test for XSS vulnerabilities in user input fields

Check Version:

Transaction SM51 or OS command: sapcontrol -nr <instance> -function GetVersionInfo

Verify Fix Applied:

Verify patch installation via SAP transaction SPAM/SAINT; test previously vulnerable input fields for XSS

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in user input fields
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • Suspicious script tags or JavaScript in HTTP requests to SAP endpoints

SIEM Query:

source="sap_web_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export