CVE-2025-43006

6.1 MEDIUM

📋 TL;DR

CVE-2025-43006 is a Cross-Site Scripting (XSS) vulnerability in SAP Supplier Relationship Management's Master Data Management Catalogue that allows unauthenticated attackers to inject and execute malicious scripts. This could lead to session hijacking, data theft, or unauthorized actions when users interact with compromised pages. Organizations running vulnerable SAP SRM MDM Catalogue instances are affected.

💻 Affected Systems

Products:
  • SAP Supplier Relationship Management (SRM)
  • SAP Master Data Management (MDM) Catalogue
Versions: Specific versions not detailed in advisory; check SAP Note 3588455 for exact affected versions
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Master Data Management Catalogue component of SAP SRM. Requires the vulnerable component to be exposed and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, perform unauthorized transactions, or deface the application, potentially leading to data breaches and financial loss.

🟠

Likely Case

Attackers inject malicious scripts to steal session cookies or user credentials, enabling unauthorized access to sensitive supplier and procurement data.

🟢

If Mitigated

With proper input validation and output encoding, the risk is limited to minor UI disruption with no data compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity. No authentication required makes this easier to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check SAP Note 3588455 for specific patch versions

Vendor Advisory: https://me.sap.com/notes/3588455

Restart Required: Yes

Instructions:

1. Review SAP Note 3588455 for your specific SAP SRM version. 2. Apply the recommended SAP Security Patch. 3. Restart affected SAP services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side input validation and output encoding for all user-supplied data in the MDM Catalogue component

Content Security Policy (CSP)

all

Implement strict CSP headers to restrict script execution sources

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads
  • Restrict network access to SAP SRM MDM Catalogue to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check SAP system version against affected versions in SAP Note 3588455. Test for XSS by attempting to inject script payloads into MDM Catalogue input fields.

Check Version:

Use SAP transaction SM51 or check system info in SAP GUI

Verify Fix Applied:

Verify patch installation via SAP transaction SPAM/SAINT. Test that script injection attempts are properly sanitized or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual input patterns containing script tags or JavaScript in MDM Catalogue logs
  • Multiple failed script injection attempts

Network Indicators:

  • HTTP requests containing suspicious script payloads to MDM Catalogue endpoints
  • Unexpected outbound connections after visiting MDM pages

SIEM Query:

source="sap_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND component="MDM_Catalogue"

🔗 References

📤 Share & Export