CVE-2025-31325

5.8 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Scripting vulnerability in SAP NetWeaver's ABAP Keyword Documentation component. An unauthenticated attacker can inject malicious JavaScript through an unprotected parameter, which executes in victims' browsers when they access the affected page. This affects SAP NetWeaver systems with the vulnerable component exposed.

💻 Affected Systems

Products:
  • SAP NetWeaver
Versions: Specific versions as per SAP Note 3590887
Operating Systems: All supported SAP NetWeaver OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ABAP Keyword Documentation component to be accessible

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, authentication tokens, or sensitive data from authenticated users' browsers, potentially leading to account compromise or data exfiltration.

🟠

Likely Case

Attacker performs limited session hijacking or steals user-specific information from the vulnerable page context.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability is prevented from executing malicious scripts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Standard XSS exploitation techniques apply; no authentication required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: As specified in SAP Note 3590887

Vendor Advisory: https://me.sap.com/notes/3590887

Restart Required: Yes

Instructions:

1. Review SAP Note 3590887 for specific patch details. 2. Apply the SAP Security Patch Day updates. 3. Restart affected SAP NetWeaver systems.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize the vulnerable parameter

Implement ABAP input validation for affected parameters

Content Security Policy

all

Deploy CSP headers to restrict script execution

Set Content-Security-Policy HTTP headers

🧯 If You Can't Patch

  • Restrict network access to the ABAP Keyword Documentation component
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test the vulnerable parameter with XSS payloads; check SAP system version against patched versions in Note 3590887

Check Version:

Use SAP transaction SM51 or check kernel patch level

Verify Fix Applied:

Verify patch application via SAP transaction SPAM/SAINT; retest with XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values in web server logs
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests with script tags or JavaScript in parameters

SIEM Query:

web.url:* AND (web.param:*script* OR web.param:*javascript*)

🔗 References

📤 Share & Export