VYPR
Medium severity4.9NVD Advisory· Published Aug 12, 2025· Updated Apr 15, 2026

CVE-2025-42949

CVE-2025-42949

Description

Due to a missing authorization check in the ABAP Platform, an authenticated user with elevated privileges could bypass authorization restrictions for common transactions by leveraging the SQL Console. This could enable an attacker to access and read the contents of database tables without proper authorization, leading to a significant compromise of data confidentiality. However, the integrity and availability of the system remain unaffected.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An authenticated SAP ABAP user with elevated privileges can bypass authorization checks using the SQL Console to read arbitrary database tables.

Vulnerability

Overview

CVE-2025-42949 is a missing authorization check in the SAP ABAP Platform. The SQL Console does not properly verify whether the authenticated user has the necessary rights to access and read specific database tables, allowing a user who already holds elevated privileges to exceed their intended authorization scope. The root cause is an insufficient permission validation before executing SQL queries via the console interface.

Exploitation

To exploit this vulnerability, an attacker must be an authenticated user with elevated privileges on the SAP system. The attack vector is network-based, requires low attack complexity, and no user interaction. Leveraging the SQL Console, the attacker can issue direct database queries. The missing authorization check means the system will not enforce table-level access restrictions that normally apply to ABAP transactions, effectively bypassing the intended security model. No special privileges beyond already being an authenticated elevated user are needed.

Impact

Successful exploitation leads to unauthorized reading of any database table on the system. This directly compromises data confidentiality, as the attacker can extract sensitive information stored in the database. The CVSS v3 score of 4.9 (Medium) reflects this confidentiality impact, while integrity and availability remain unaffected. The impact is limited to data exposure; the attacker cannot modify or delete data.

Mitigation

SAP has released a security patch for this issue as part of its monthly Security Patch Day. Administrators are strongly advised to apply the relevant SAP Security Note for ABAP Platform to correct the missing authorization check. No workarounds are currently documented; patching is the recommended mitigation. This CVE is not yet listed on CISA's Known Exploited Vulnerabilities (KEV) catalog.

[1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.