CVE-2025-42945

6.1 MEDIUM

📋 TL;DR

SAP NetWeaver Application Server ABAP contains an HTML injection vulnerability that allows attackers to craft malicious URLs with script payloads. When victims with active sessions click these links, attackers can access or manipulate limited data. This affects organizations running vulnerable SAP NetWeaver ABAP systems.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
Versions: Specific versions not detailed in CVE; check SAP Note 3585491 for affected versions
Operating Systems: All platforms running SAP NetWeaver ABAP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction (victim must click malicious link) and active user session for exploitation

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, or manipulate application data through cross-site scripting attacks.

🟠

Likely Case

Attackers would typically steal session tokens or perform limited data manipulation through reflected XSS attacks against authenticated users.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented, though the underlying code flaw would remain.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick users into clicking malicious URLs

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3585491

Vendor Advisory: https://me.sap.com/notes/3585491

Restart Required: No

Instructions:

1. Download SAP Note 3585491 from SAP Support Portal. 2. Apply the correction instructions in the note. 3. Test the fix in development before production deployment.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution from untrusted sources

Add 'Content-Security-Policy' header with appropriate directives

Input Validation Filtering

all

Implement server-side validation to sanitize URL parameters

Implement input validation for all URL parameters in affected components

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious script patterns in URLs
  • Educate users about phishing risks and suspicious links

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3585491 is applied in your system using transaction SNOTE

Check Version:

Use SAP transaction SM51 to check system details and applied notes

Verify Fix Applied:

Test with safe payloads to confirm HTML injection is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with script tags or JavaScript in access logs
  • Multiple failed attempts with malicious payloads

Network Indicators:

  • HTTP requests containing suspicious script patterns in URL parameters

SIEM Query:

web.url:*<script* OR web.url:*javascript:*

🔗 References

📤 Share & Export