CVE-2025-42908
Description
Due to a Cross-Site Request Forgery (CSRF) vulnerability in SAP NetWeaver Application Server for ABAP, an authenticated attacker could initiate transactions directly via the session manager, bypassing the first transaction screen and the associated authorization check. This vulnerability could allow the attacker to perform actions and execute transactions that would normally require specific permissions, compromising the integrity and confidentiality of the system by enabling unauthorized access to restricted functionality. There is no impact to availability from this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A CSRF vulnerability in SAP NetWeaver AS ABAP lets authenticated attackers bypass authorization checks and execute restricted transactions.
Vulnerability
Overview
CVE-2025-42908 is a Cross-Site Request Forgery (CSRF) vulnerability in SAP NetWeaver Application Server for ABAP. The root cause lies in the session manager's handling of transaction initiation; an authenticated attacker can craft a request that bypasses the first transaction screen and its associated authorization check. This bypass allows the attacker to directly initiate transactions intended to be protected by permission controls [1].
Exploitation
Prerequisites
Exploitation requires that the attacker is already authenticated to the SAP system. The attack is performed by persuading an authenticated user (or using another session) to follow a malicious link or visit a crafted page that triggers a cross-origin request. No additional authentication is needed for the target transaction because the legitimate session's cookies are used, but the authorization check normally performed at the first screen is skipped. This makes the attack relatively simple for an authenticated adversary with network access to the SAP application [1].
Impact
Successful exploitation allows the attacker to execute transactions and perform actions that would normally require specific permissions. This can lead to unauthorized access to restricted functionality, potentially compromising the integrity and confidentiality of the system. The impact is limited to confidentiality and integrity; there is no impact on availability [1].
Mitigation
SAP has addressed this vulnerability in its regular Security Patch Day release. Organizations running SAP NetWeaver AS ABAP should apply the relevant security note as soon as possible. The affected versions are supported under SAP's maintenance strategy, and patches are available through SAP for Me [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.