CVE-2025-42938
Description
Due to a Cross-Site Scripting (XSS) vulnerability in the SAP NetWeaver ABAP Platform, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated user clicks on this link, the injected input is processed during the website�s page generation, resulting in the creation of malicious content. When executed, this content allows the attacker to access or modify information within the victim's browser scope, impacting the confidentiality and integrity�while availability remains unaffected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated attacker can craft a malicious link that, when clicked by an authenticated user, triggers stored XSS in SAP NetWeaver ABAP Platform, compromising confidentiality and integrity.
Vulnerability
Overview
CVE-2025-42938 is a Cross-Site Scripting (XSS) vulnerability in the SAP NetWeaver ABAP Platform. The root cause lies in insufficient sanitization of user-supplied input during page generation. An unauthenticated attacker can create a malicious link and make it publicly accessible; when an authenticated user clicks the link, the injected script is processed and rendered by the application [1].
Exploitation
Prerequisites
No authentication is required to generate the malicious link, but the victim must be an authenticated user of the SAP system. The attack is delivered via a crafted URL, and the injected content becomes part of the victim's browser executes within the context of the vulnerable application. The vulnerability does not require any special network position beyond standard web access [1].
Impact
Successful exploitation allows the attacker to access or modify information within the victim's browser scope. This directly impacts the confidentiality and integrity of data visible to the victim, while availability remains unaffected. The attacker could potentially steal session tokens, perform actions on behalf of the victim, or deface the application interface [1].
Mitigation
SAP has released security patches as part of its monthly Security Patch Day. Customers are strongly advised to apply the relevant SAP Security Notes for CVE-2025-42938. No workarounds are mentioned in the available references; patching is the recommended course of action [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.