VYPR
Medium severity4.3NVD Advisory· Published Nov 11, 2025· Updated Apr 15, 2026

CVE-2025-42882

CVE-2025-42882

Description

Due to a missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker with basic privileges could execute a specific function module in ABAP to retrieve restricted technical information from the system. This disclosure of environment details of the system could further assist this attacker to plan subsequent attacks. As a result, this vulnerability has a low impact on confidentiality, with no impact on the integrity or availability of the application.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An authenticated attacker with basic privileges can exploit a missing authorization check in SAP NetWeaver ABAP to retrieve restricted technical information.

Vulnerability

Overview CVE-2025-42882 is a missing authorization check vulnerability in SAP NetWeaver Application Server for ABAP. The flaw allows an authenticated attacker with basic privileges to execute a specific function module that retrieves restricted technical information from the system. The root cause is the absence of proper authorization validation for this function module, enabling unauthorized access to environment details.

Exploitation

An attacker must be authenticated to the SAP system and possess basic user privileges. No special network position or additional authentication is required beyond the initial session. The attacker can directly invoke the vulnerable function module to extract sensitive technical data, such as system configuration or internal details.

Impact

Successful exploitation results in the disclosure of restricted technical information, which has a low impact on confidentiality. The vulnerability does not affect the integrity or availability of the application. However, the leaked information could assist the attacker in planning subsequent, more severe attacks against the system.

Mitigation

SAP has addressed this vulnerability through its regular Security Patch Day process [1]. Customers are advised to apply the relevant SAP Security Note as soon as possible. The fix is included in the latest support packages for affected versions under mainstream and extended maintenance.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.