SAP released its October 2025 Security Patch Day fixes, addressing 13 new vulnerabilities and updating four prior notes, with several critical flaws in NetWeaver enabling attackers to sidestep authorization and run arbitrary operating system commands on affected systems.
Among the most alarming is CVE-2025-42944, an insecure deserialization issue in SAP NetWeaver AS Java’s RMI-P4 module, rated at a perfect CVSS score of 10.0 for its potential to grant unauthenticated remote attackers full control without any login credentials.
This vulnerability, first patched in September but now bolstered with extra safeguards, underscores the ongoing risks to SAP environments that power global business operations, potentially leading to data breaches, ransomware deployment, or complete system takeovers.
Critical Deserialization Flaw Allows Remote Takeover
The core threat stems from how SAP NetWeaver handles serialized Java objects over its proprietary RMI-P4 protocol, typically exposed on ports like 50004 or 50014, where insufficient validation allows malicious payloads to be deserialized and executed directly on the server.
Attackers can craft these payloads remotely over the network, bypassing all authentication checks and triggering arbitrary OS command execution with the privileges of the NetWeaver process, which often runs with elevated access in enterprise setups.
Onapsis Research Labs collaborated with SAP to identify this risk, noting that exploitation requires no user interaction and could compromise confidentiality, integrity, and availability across connected SAP landscapes.
Affected versions include SERVERCORE 7.50, and while no public proofs-of-concept exist yet, the flaw’s simplicity makes it a prime target for threat actors scanning for unpatched systems.
SAP’s October update to notes 3660659 and 3634501 introduces a JVM-wide filter (jdk.serialFilter) to block dangerous class deserialization, dividing protections into mandatory and optional lists developed with security experts to prevent gadget chains that lead to code execution.
However, complementary issues amplify the danger, such as CVE-2025-31331, an authorization bypass in older NetWeaver versions (SAP_ABA 700 to 75I), allowing low-privileged users to access restricted functions and potentially escalate to command injection.
Another update to note 3441087 covers missing checks in SAP S/4HANA’s purchase contract management, while CVE-2025-42901 enables code injection via the BAPI Browser in ABAP servers, letting authenticated users alter code flows and expose sensitive data [query].
These flaws, with CVSS scores from 4.3 to 5.4, highlight persistent gaps in access controls that could chain with deserialization exploits for deeper intrusions.
Beyond NetWeaver, the patch day tackles related high-severity issues like CVE-2025-42937, a 9.8-rated directory traversal in SAP Print Service versions 8.00 and 8.10, enabling unauthenticated file overwrites, and CVE-2025-42910, a file upload vulnerability in Supplier Relationship Management that escalates to system compromise.
CVE IDNote IDProductAffected VersionsSeverityCVSS ScoreDescriptionCVE-2025-429443660659, 3634501 (update)SAP NetWeaver AS Java (RMI-P4)SERVERCORE 7.50Critical10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Insecure deserialization allowing unauthenticated remote code execution via malicious payloads on open ports.CVE-2025-429373630595SAP Print ServiceSAPSPRINT 8.00, 8.10Critical9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)Directory traversal due to insufficient path validation, enabling unauthenticated file overwrites .CVE-2025-429103647332SAP Supplier Relationship ManagementSRMNXP01 100, 150Critical9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)Unrestricted file upload allowing authenticated users with user interaction to achieve system compromise .CVE-2025-51153664466SAP Commerce Cloud (Search and Navigation)HY_COM 2205, COM_CLOUD 2211, 2211-JDK21High7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)Denial of service via resource exhaustion in search functionality.CVE-2025-489133658838SAP Data Hub Integration SuiteCX_DATAHUB_INT_PACK 2205High7.1 (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)Security misconfiguration exposing sensitive data over adjacent networks with user interaction .CVE-2025-00593503138 (update)SAP NetWeaver Application Server ABAP (SAP GUI for HTML)KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.12, 9.14Medium6.0 (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)Information disclosure of client-side input history to high-privilege local attackers.CVE-2025-429013652788SAP Application Server for ABAP (BAPI Browser)SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816Medium5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)Code injection allowing low-privileged users to alter code execution flows.CVE-2025-429083642021SAP NetWeaver Application Server for ABAPKRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.16Medium5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)Cross-site request forgery via inconsistent session handling, bypassing first-screen checks .CVE-2025-429843441087 (update)SAP S/4HANA (Manage Central Purchase Contract)S4CORE 106, 107, 108Medium5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)Missing authorization checks allowing low-privileged access to sensitive procurement functions.CVE-2025-429063634724SAP Commerce CloudCOM_CLOUD 2211Medium5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Directory traversal exposing limited file reads without authentication.CVE-2025-429023627308SAP NetWeaver AS ABAP and ABAP PlatformKRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53; KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15, 9.16Medium5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Memory corruption in ticket verification leading to unauthenticated denial of service.CVE-2025-429393625683SAP S/4HANA (Manage Processing Rules for Bank Statements)S4CORE 104, 105, 106, 107, 108, 109Medium4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)Missing authorization allowing low-privileged users to manipulate bank statement rules .CVE-2025-313313577131 (update)SAP NetWeaverSAP_ABA 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H, 75IMedium4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)Authorization bypass enabling low-privileged access to restricted NetWeaver functions.CVE-2025-429033656781SAP Financial Service Claims ManagementINSURANCE 803, 804, 805, 806; S4CEXT 107, 108, 109Medium4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)User enumeration and sensitive data exposure via RFC functions .CVE-2025-316723617142SAP BusinessObjects (Web Intelligence and Platform Search)ENTERPRISE 430, 2025, 2027Low3.5 (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)User enumeration and sensitive data exposure via RFC functions.CVE-2025-429093643871SAP Cloud Appliance Library AppliancesTITANIUM_WEBAPP 4.0Low3.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N)Deserialization flaw allowing low-privileged users with interaction to cause integrity issues.
Security firms urge immediate patching, emphasizing multi-layered defenses given the rising exploits in SAP ecosystems, as seen in recent zero-days.
SAP advises customers to prioritize these updates via the Support Portal to safeguard against evolving threats in mission-critical applications.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands appeared first on Cyber Security News.