VYPR
Medium severity6.5NVD Advisory· Published Sep 9, 2025· Updated Apr 15, 2026

CVE-2025-42912

CVE-2025-42912

Description

SAP HCM My Timesheet Fiori 2.0 application does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This issue has a significant impact on the application's integrity, while confidentiality and availability remain unaffected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SAP HCM My Timesheet Fiori 2.0 fails to enforce authorization checks, allowing authenticated users to escalate privileges and compromise data integrity.

Vulnerability

Overview

CVE-2025-42912 is a missing authorization check vulnerability in the SAP HCM My Timesheet Fiori 2.0 application. The application does not perform necessary authorization checks for authenticated users, leading to an escalation of privileges. The underlying root cause is the absence of proper access control enforcement in the application's business logic, allowing a user to perform actions that should be restricted to higher-privileged roles [1].

Exploitation

Conditions

An attacker must first be an authenticated user of the SAP HCM My Timesheet Fiori 2.0 application. No additional privileges are required initially. The exploit is carried out by sending crafted requests to the application that trigger the missing authorization checks. The attack vector is over the network, and the vulnerability can be exploited without any user interaction or special conditions beyond valid credentials [1].

Impact and

Mitigation

Successful exploitation allows the attacker to perform unauthorized actions within the application, primarily impacting the integrity of the application's data. Confidentiality and availability are not affected. The CVSS v3 base score of 6.5 (Medium) reflects this significant integrity impact. SAP has released security patches as part of its regular Patch Day cycle; users are advised to apply the relevant SAP Security Notes to remediate this vulnerability [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.