CVE-2025-42920

6.1 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in SAP Supplier Relationship Management allows unauthenticated attackers to create malicious links that, when clicked by authenticated users, execute arbitrary JavaScript in the victim's browser. This enables attackers to steal session cookies, modify page content, or perform actions on behalf of the victim. All organizations using vulnerable versions of SAP SRM are affected.

💻 Affected Systems

Products:
  • SAP Supplier Relationship Management
Versions: Specific versions not provided in CVE description; check SAP Note 3647098 for exact affected versions
Operating Systems: All platforms running SAP SRM
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface component; requires user interaction (clicking malicious link) to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full access to SAP SRM system, modifies supplier data, approves fraudulent payments, and exfiltrates sensitive business information.

🟠

Likely Case

Attacker steals user session cookies to access the victim's SAP SRM account, views confidential supplier information, and potentially modifies purchase orders or supplier details.

🟢

If Mitigated

With proper input validation and output encoding, the malicious script payloads are neutralized, preventing execution while maintaining normal system functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users into clicking malicious links; no authentication bypass needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See SAP Note 3647098 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3647098

Restart Required: No

Instructions:

1. Review SAP Note 3647098 for affected versions and patches. 2. Apply the relevant SAP Security Patch Day updates. 3. Test the patch in development environment before production deployment.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Deploy CSP headers to restrict script execution sources and prevent inline script execution

Input Validation and Output Encoding

all

Implement server-side validation of all user inputs and proper output encoding for HTML contexts

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads in URLs and parameters
  • Educate users about phishing risks and implement URL filtering to block suspicious external links

🔍 How to Verify

Check if Vulnerable:

Check SAP system version against affected versions listed in SAP Note 3647098

Check Version:

Use SAP transaction SM51 or check system info in SAP GUI

Verify Fix Applied:

Verify patch installation via SAP transaction SPAM/SAINT and test with safe XSS payloads in test environment

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript code in web server logs
  • Multiple failed login attempts following suspicious URL access

Network Indicators:

  • HTTP requests with suspicious parameters containing <script>, javascript:, or encoded payloads

SIEM Query:

web.url:*script* OR web.url:*javascript:* AND dest.app:"SAP SRM"

🔗 References

📤 Share & Export