CVE-2025-25245

5.4 MEDIUM

📋 TL;DR

SAP BusinessObjects Web Intelligence contains an insecure deprecated endpoint vulnerable to cross-site scripting (XSS). Attackers can inject malicious URLs that execute in victims' browsers, potentially stealing session cookies or performing unauthorized actions. Organizations using affected SAP BusinessObjects versions are impacted.

💻 Affected Systems

Products:
  • SAP BusinessObjects Business Intelligence Platform
  • SAP BusinessObjects Web Intelligence
Versions: Specific versions not detailed in CVE; refer to SAP Note 3557469 for affected versions
Operating Systems: All supported OS for SAP BusinessObjects
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in a deprecated web application endpoint that remains accessible by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals authenticated session cookies, gains unauthorized access to business intelligence data, and performs actions as the victim user within the application scope.

🟠

Likely Case

Attacker performs session hijacking or credential theft through malicious JavaScript execution in victim's browser, leading to unauthorized data access.

🟢

If Mitigated

With proper input validation and output encoding, malicious payloads are neutralized before reaching users, preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) and authenticated access to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Security Patch Day updates and SAP Note 3557469

Vendor Advisory: https://me.sap.com/notes/3557469

Restart Required: Yes

Instructions:

1. Review SAP Note 3557469 for specific patch details. 2. Apply the security patch from SAP Support Portal. 3. Restart SAP BusinessObjects services. 4. Verify the deprecated endpoint is secured or removed.

🔧 Temporary Workarounds

Disable deprecated endpoint

all

Remove or restrict access to the vulnerable deprecated web endpoint

Configuration specific to SAP BusinessObjects; consult SAP documentation for endpoint management

Implement WAF rules

all

Configure web application firewall to block XSS payloads targeting the vulnerable endpoint

WAF-specific configuration for XSS filtering on SAP BusinessObjects paths

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for all user-supplied data in the application
  • Use Content Security Policy (CSP) headers to restrict script execution sources

🔍 How to Verify

Check if Vulnerable:

Check if the deprecated endpoint is accessible and test for XSS vulnerabilities using security testing tools

Check Version:

Check SAP BusinessObjects version through Central Management Console or via command: java -version (for Java components)

Verify Fix Applied:

Verify the patch is applied by checking version against SAP Note 3557469 and test that XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to deprecated endpoints
  • HTTP requests containing suspicious script tags or JavaScript payloads

Network Indicators:

  • Traffic to known vulnerable endpoints with encoded payloads
  • Unexpected redirects or script injections in responses

SIEM Query:

source="sap_businessobjects" AND (url="*vulnerable_endpoint*" AND (content="*script*" OR content="*javascript*"))

🔗 References

📤 Share & Export