VYPR
Medium severity4.3NVD Advisory· Published Nov 11, 2025· Updated Apr 15, 2026

CVE-2025-42899

CVE-2025-42899

Description

SAP S4CORE (Manage journal entries) does not perform necessary authorization checks for an authenticated user resulting in escalation of privileges. This has low impact on confidentiality of the application with no impact on integrity and availability of the application.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SAP S4CORE fails to authorize journal entry management, letting authenticated users escalate privileges and access restricted data.

Vulnerability

Overview

CVE-2025-42899 is an authorization bypass in SAP S4CORE's "Manage journal entries" component. The application does not perform the necessary authorization checks for an authenticated user, allowing the user to perform actions that should be restricted. This flaw stems from missing or insufficient access control enforcement on the server side, a common class of vulnerability in enterprise resource planning (ERP) systems where role-based permissions are not consistently validated.

Exploitation

Conditions

An attacker must first have a valid authenticated session in the SAP S4CORE system. No special privileges are required beyond a standard user account. The attack can be carried out over the network by sending crafted requests to the journal entry management endpoint. Because the missing check occurs at the application layer, no additional authentication or physical access is needed. The CVSS v3 base score of 4.3 (Medium) reflects the low attack complexity and low complexity and the requirement for authentication.

Impact

Successful exploitation leads to escalation of privileges, meaning the authenticated user can access or modify journal entries that should be off-limits according to their assigned to their role. The official description states this has a low impact on confidentiality, with no impact on integrity or availability. Therefore, an attacker could view sensitive financial data (e.g., accounting entries, vendor details) but cannot alter or delete records, nor disrupt system availability. service.

Mitigation

SAP has addressed this vulnerability in its monthly Security Patch Day [1]. Customers should apply the relevant SAP Security Note for their S4CORE version. SAP recommends implementing all Patch Day Security Notes at priority [1]. No workarounds are documented; the fix is delivered via support packages. Organizations running affected versions should prioritize patching to prevent unauthorized data exposure.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.