VYPR
Medium severity6.1NVD Advisory· Published Jul 8, 2025· Updated Apr 15, 2026

CVE-2025-42962

CVE-2025-42962

Description

SAP Business Warehouse (Business Explorer Web) allows an attacker to create a malicious link. If an authenticated user clicks on this link, the injected script gets executed within the scope of victim�s browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SAP Business Warehouse Business Explorer Web is vulnerable to stored cross-site scripting via malicious links, allowing script execution in the victim's browser.

Root

Cause CVE-2025-42962 is a cross-site scripting (XSS) vulnerability in SAP Business Warehouse (Business Explorer Web). The application fails to properly sanitize user-controlled input when constructing links. An attacker can craft a malicious link that, when clicked by an authenticated user, causes arbitrary JavaScript injected by the attacker to execute in the context of the victim's session [1].

Exploitation

Prerequisites The attacker requires an authenticated user session to deliver the malicious link, but does not need special privileges beyond the ability to create or share crafted URLs. The attack vector is network-based and triggered by user interaction (clicking the link). No authentication is needed for the attacker; the victim must be authenticated to the affected SAP system [1].

Impact

Successful exploitation leads to compromise of confidentiality and integrity within the victim's browser session. The attacker can potentially read sensitive data displayed in the application, perform actions on behalf of the victim, or modify content shown in the browser. Availability is not affected [1].

Mitigation

SAP has released security patches as part of its monthly Security Patch Day. These fixes are available via SAP Security Notes for the affected versions under mainstream and extended maintenance. Administrators should apply the relevant patches promptly; no workarounds are documented [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.