Cyber Posture

CVE-2025-42950

CriticalRCE

Published: 12 August 2025

Published
12 August 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0013 31.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-42950 is a critical-severity Code Injection (CWE-94) vulnerability in Sap (inferred from references). Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the code injection vulnerability in the SLT RFC function module by applying timely patches as specified in SAP Note 3633838.

prevent

Validates and sanitizes inputs to the exposed RFC function module to block arbitrary ABAP code injection attacks.

prevent

Enforces approved authorizations on the vulnerable RFC function module to mitigate bypass of essential authorization checks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct remote authenticated code injection via exposed RFC function module enables exploitation of remote services and public-facing apps for privilege escalation to full system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively…

more

functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.

Deeper analysisAI

CVE-2025-42950 is a critical vulnerability in SAP Landscape Transformation (SLT), affecting a function module exposed via RFC. The flaw allows an attacker with user privileges to inject arbitrary ABAP code into the system, bypassing essential authorization checks. Rated at CVSS 9.9 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and mapped to CWE-94 (Code Injection), it effectively acts as a backdoor, posing risks to the confidentiality, integrity, and availability of the affected SAP system.

An attacker requires low-privilege user credentials with network access to the SLT component. Exploitation involves invoking the vulnerable RFC-exposed function module to inject and execute arbitrary ABAP code, enabling full system compromise without user interaction. Successful attacks can lead to unauthorized data access, modification, or deletion, as well as disruption of system services.

Mitigation details are provided in SAP Note 3633838 and the SAP Security Patch Day advisory at the referenced URLs, which outline patches and remediation steps for affected systems.

Details

CWE(s)

Affected Products

Sap
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-42957Shared CWE-94
CVE-2026-27952Shared CWE-94
CVE-2026-32573Shared CWE-94
CVE-2026-31857Shared CWE-94
CVE-2025-48984Shared CWE-94
CVE-2026-3132Shared CWE-94
CVE-2026-28425Shared CWE-94
CVE-2025-6990Shared CWE-94
CVE-2024-56373Shared CWE-94
CVE-2025-65294Shared CWE-94

References