CVE-2025-42950
Published: 12 August 2025
Summary
CVE-2025-42950 is a critical-severity Code Injection (CWE-94) vulnerability in Sap (inferred from references). Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the code injection vulnerability in the SLT RFC function module by applying timely patches as specified in SAP Note 3633838.
Validates and sanitizes inputs to the exposed RFC function module to block arbitrary ABAP code injection attacks.
Enforces approved authorizations on the vulnerable RFC function module to mitigate bypass of essential authorization checks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote authenticated code injection via exposed RFC function module enables exploitation of remote services and public-facing apps for privilege escalation to full system compromise.
NVD Description
SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively…
more
functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Deeper analysisAI
CVE-2025-42950 is a critical vulnerability in SAP Landscape Transformation (SLT), affecting a function module exposed via RFC. The flaw allows an attacker with user privileges to inject arbitrary ABAP code into the system, bypassing essential authorization checks. Rated at CVSS 9.9 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and mapped to CWE-94 (Code Injection), it effectively acts as a backdoor, posing risks to the confidentiality, integrity, and availability of the affected SAP system.
An attacker requires low-privilege user credentials with network access to the SLT component. Exploitation involves invoking the vulnerable RFC-exposed function module to inject and execute arbitrary ABAP code, enabling full system compromise without user interaction. Successful attacks can lead to unauthorized data access, modification, or deletion, as well as disruption of system services.
Mitigation details are provided in SAP Note 3633838 and the SAP Security Patch Day advisory at the referenced URLs, which outline patches and remediation steps for affected systems.
Details
- CWE(s)