CVE-2025-42919
Description
Due to an Information Disclosure vulnerability in SAP NetWeaver Application Server Java, internal metadata files could be accessed via manipulated URLs. An unauthenticated attacker could exploit this vulnerability by inserting arbitrary path components in the request, allowing unauthorized access to sensitive application metadata. This results in a partial compromise of the confidentiality of the information without affecting the integrity or availability of the application server.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated attacker can access internal metadata files in SAP NetWeaver Application Server Java via path manipulation, leading to partial information disclosure.
Vulnerability
Overview
CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java. The root cause lies in insufficient validation of URL path components, allowing an attacker to insert arbitrary path segments into a request. This enables unauthorized access to internal metadata files that should not be exposed to unauthenticated users [1].
Exploitation
The vulnerability can be exploited remotely by an unauthenticated attacker who crafts a manipulated URL containing path traversal or arbitrary path components. No authentication or special privileges are required, and the attack can be carried out over the network without any user interaction. The attack surface is the HTTP interface of the SAP NetWeaver Application Server Java [1].
Impact
Successful exploitation results in partial compromise of confidentiality, as the attacker can read sensitive application metadata. The vulnerability does not affect the integrity or availability of the server. The disclosed metadata could aid in further attacks by revealing internal application structure or configuration details [1].
Mitigation
SAP has released security patches as part of its regular Security Patch Day. Customers are advised to apply the relevant SAP Security Notes to remediate the vulnerability. No workarounds are mentioned, and the vendor recommends implementing the corrections as a priority [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.