CVE-2025-42882
Description
Due to a missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker with basic privileges could execute a specific function module in ABAP to retrieve restricted technical information from the system. This disclosure of environment details of the system could further assist this attacker to plan subsequent attacks. As a result, this vulnerability has a low impact on confidentiality, with no impact on the integrity or availability of the application.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated attacker with basic privileges can exploit a missing authorization check in SAP NetWeaver ABAP to retrieve restricted technical information.
Vulnerability
Overview CVE-2025-42882 is a missing authorization check vulnerability in SAP NetWeaver Application Server for ABAP. The flaw allows an authenticated attacker with basic privileges to execute a specific function module that retrieves restricted technical information from the system. The root cause is the absence of proper authorization validation for this function module, enabling unauthorized access to environment details.
Exploitation
An attacker must be authenticated to the SAP system and possess basic user privileges. No special network position or additional authentication is required beyond the initial session. The attacker can directly invoke the vulnerable function module to extract sensitive technical data, such as system configuration or internal details.
Impact
Successful exploitation results in the disclosure of restricted technical information, which has a low impact on confidentiality. The vulnerability does not affect the integrity or availability of the application. However, the leaked information could assist the attacker in planning subsequent, more severe attacks against the system.
Mitigation
SAP has addressed this vulnerability through its regular Security Patch Day process [1]. Customers are advised to apply the relevant SAP Security Note as soon as possible. The fix is included in the latest support packages for affected versions under mainstream and extended maintenance.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.