Cyber Posture

CVE-2025-42957

CriticalRCE

Published: 12 August 2025

Published
12 August 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0015 35.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-42957 is a critical-severity Code Injection (CWE-94) vulnerability in Sap (inferred from references). Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the code injection vulnerability by requiring timely application of the vendor patch in SAP security note 3627998.

prevent

Validates inputs to the RFC function module to prevent arbitrary ABAP code injection attacks.

prevent

Enforces robust authorization checks to mitigate bypasses exploited by the vulnerable function module.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Direct ABAP code injection in network-exposed RFC module enables remote exploitation of application services (T1190/T1210) and bypasses auth for effective privilege escalation to arbitrary execution (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as…

more

a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.

Deeper analysisAI

CVE-2025-42957 is a critical vulnerability (CVSS 9.9, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) in SAP S/4HANA, published on 2025-08-12. It affects a function module exposed via RFC, classified under CWE-94 (code injection). The flaw allows an attacker with user privileges to inject arbitrary ABAP code into the system, bypassing essential authorization checks and functioning as a backdoor that risks full system compromise, undermining confidentiality, integrity, and availability.

An attacker with low-privilege user credentials and network access to the SAP S/4HANA system can exploit this vulnerability remotely with low complexity and no user interaction required. Upon successful exploitation, the attacker achieves arbitrary ABAP code execution with a changed scope, enabling high-impact control over the system, including potential escalation to full compromise.

SAP addresses this vulnerability in security note 3627998 (https://me.sap.com/notes/3627998) as part of the SAP Security Patch Day (https://url.sap/sapsecuritypatchday). Security practitioners should review and apply the specified patches to mitigate the risk.

Details

CWE(s)

Affected Products

Sap
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-42950Shared CWE-94
CVE-2026-27952Shared CWE-94
CVE-2026-32573Shared CWE-94
CVE-2026-31857Shared CWE-94
CVE-2025-48984Shared CWE-94
CVE-2026-3132Shared CWE-94
CVE-2026-28425Shared CWE-94
CVE-2025-6990Shared CWE-94
CVE-2024-56373Shared CWE-94
CVE-2025-65294Shared CWE-94

References