VYPR
Medium severity6.1NVD Advisory· Published Sep 9, 2025· Updated Apr 15, 2026

CVE-2025-42938

CVE-2025-42938

Description

Due to a Cross-Site Scripting (XSS) vulnerability in the SAP NetWeaver ABAP Platform, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated user clicks on this link, the injected input is processed during the website�s page generation, resulting in the creation of malicious content. When executed, this content allows the attacker to access or modify information within the victim's browser scope, impacting the confidentiality and integrity�while availability remains unaffected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated attacker can craft a malicious link that, when clicked by an authenticated user, triggers stored XSS in SAP NetWeaver ABAP Platform, compromising confidentiality and integrity.

Vulnerability

Overview

CVE-2025-42938 is a Cross-Site Scripting (XSS) vulnerability in the SAP NetWeaver ABAP Platform. The root cause lies in insufficient sanitization of user-supplied input during page generation. An unauthenticated attacker can create a malicious link and make it publicly accessible; when an authenticated user clicks the link, the injected script is processed and rendered by the application [1].

Exploitation

Prerequisites

No authentication is required to generate the malicious link, but the victim must be an authenticated user of the SAP system. The attack is delivered via a crafted URL, and the injected content becomes part of the victim's browser executes within the context of the vulnerable application. The vulnerability does not require any special network position beyond standard web access [1].

Impact

Successful exploitation allows the attacker to access or modify information within the victim's browser scope. This directly impacts the confidentiality and integrity of data visible to the victim, while availability remains unaffected. The attacker could potentially steal session tokens, perform actions on behalf of the victim, or deface the application interface [1].

Mitigation

SAP has released security patches as part of its monthly Security Patch Day. Customers are strongly advised to apply the relevant SAP Security Notes for CVE-2025-42938. No workarounds are mentioned in the available references; patching is the recommended course of action [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.