CVE-2025-42957
Published: 12 August 2025
Summary
CVE-2025-42957 is a critical-severity Code Injection (CWE-94) vulnerability in Sap (inferred from references). Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the code injection vulnerability by requiring timely application of the vendor patch in SAP security note 3627998.
Validates inputs to the RFC function module to prevent arbitrary ABAP code injection attacks.
Enforces robust authorization checks to mitigate bypasses exploited by the vulnerable function module.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct ABAP code injection in network-exposed RFC module enables remote exploitation of application services (T1190/T1210) and bypasses auth for effective privilege escalation to arbitrary execution (T1068).
NVD Description
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as…
more
a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Deeper analysisAI
CVE-2025-42957 is a critical vulnerability (CVSS 9.9, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) in SAP S/4HANA, published on 2025-08-12. It affects a function module exposed via RFC, classified under CWE-94 (code injection). The flaw allows an attacker with user privileges to inject arbitrary ABAP code into the system, bypassing essential authorization checks and functioning as a backdoor that risks full system compromise, undermining confidentiality, integrity, and availability.
An attacker with low-privilege user credentials and network access to the SAP S/4HANA system can exploit this vulnerability remotely with low complexity and no user interaction required. Upon successful exploitation, the attacker achieves arbitrary ABAP code execution with a changed scope, enabling high-impact control over the system, including potential escalation to full compromise.
SAP addresses this vulnerability in security note 3627998 (https://me.sap.com/notes/3627998) as part of the SAP Security Patch Day (https://url.sap/sapsecuritypatchday). Security practitioners should review and apply the specified patches to mitigate the risk.
Details
- CWE(s)