VYPR
Medium severity5.3NVD Advisory· Published Nov 11, 2025· Updated Apr 15, 2026

CVE-2025-42897

CVE-2025-42897

Description

Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An information disclosure vulnerability in SAP Business One's anonymous SLD API allows normal users to access unauthorized information, with low confidentiality impact.

Vulnerability

Overview

CVE-2025-42897 is an information disclosure vulnerability found in the anonymous API provided by SAP Business One (SLD). The root cause is that the SLD service exposes certain data through an anonymous endpoint without proper access control checks, allowing users with only normal (low) privileges to query and retrieve information that should be restricted to higher-privilege roles. [1]

Exploitation

Conditions

An attacker must have a valid normal user account on the SAP Business One system to exploit this vulnerability. No additional network access beyond normal application interaction is required, and the attacker does not need any special privileges beyond their existing user context. The vulnerability is triggered by sending crafted requests to the vulnerable SLD anonymous API endpoint. [1]

Impact

Successful exploitation enables the attacker to read unauthorized information from the application, limited to confidentiality only. The official description notes low impact on confidentiality, with no impact on integrity or availability. The CVSS v3 base score is 5.3 (Medium), reflecting the limited but tangible information leak. [1]

Mitigation

SAP has released security patches as part of its regular Security Patch Day. Customers are advised to apply the corresponding SAP Security Note in SAP for Me. Administrators should prioritize deployment of the patch, especially for installations where the SLD service is exposed to a wider user base. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.