CVE-2025-42977

| EUVD-2025-17605 HIGH
2025-06-10 [email protected]
7.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17605
CVE Published
Jun 10, 2025 - 01:15 nvd
HIGH 7.6

Description

SAP NetWeaver Visual Composer contains a Directory Traversal vulnerability caused by insufficient validation of input paths provided by a high-privileged user. This allows an attacker to read or modify arbitrary files, resulting in a high impact on confidentiality and a low impact on integrity.

Analysis

SAP NetWeaver Visual Composer contains a directory traversal vulnerability (CWE-22) that allows high-privileged users to bypass path validation controls and read or modify arbitrary files on the system. The vulnerability affects SAP NetWeaver Visual Composer across supported versions and has a CVSS score of 7.6 due to high confidentiality impact and network-accessible attack vector, though exploitation requires high privileges (PR:H). Exploitation likelihood and KEV/POC status cannot be confirmed from available data, but the high-privilege prerequisite significantly reduces real-world exploitability compared to the base CVSS score suggests.

Technical Context

This vulnerability exists in SAP NetWeaver Visual Composer, a visual development and composition platform for enterprise applications within the SAP NetWeaver ecosystem. The root cause is insufficient input validation (CWE-22: Improper Limitation of a Pathname to a Restricted Directory) in file path handling logic. When processing file paths provided by high-privileged users (likely administrators or system designers), the application fails to properly normalize and validate input paths, allowing traversal sequences (e.g., '../../../') or absolute path injection to escape intended directory boundaries. This affects the file I/O operations within the Visual Composer's design-time or runtime environment, potentially exposing sensitive configuration files, source code, or system files. The vulnerability is network-accessible (AV:N) suggesting it may be exploitable through web interfaces, but requires high privilege level (PR:H) to trigger, limiting the attack surface to authenticated administrative users.

Affected Products

SAP NetWeaver Visual Composer (specific affected versions not enumerated in provided data). CPE data not provided in source material, but affected product likely matches: cpe:2.3:a:sap:netweaver:*:*:*:*:*:*:*:* or cpe:2.3:a:sap:netweaver_visual_composer:*:*:*:*:*:*:*:*. Consult SAP Security Patch Day advisories and SAP Note database for precise version ranges. Contact SAP support or review SAP Product Availability Matrix (PAM) for complete list of affected Visual Composer releases and corresponding NetWeaver versions.

Remediation

Apply SAP security patches released for NetWeaver Visual Composer addressing CVE-2025-42977 (specific patch versions not provided in source data). Mitigation steps: (1) Consult SAP Security Patch Day announcements and security advisories for affected version patches; (2) Implement strict access controls limiting Visual Composer administrative accounts to users with legitimate design-time responsibilities; (3) Monitor and audit all file operations initiated by Visual Composer components using file system auditing (Windows Event Log, Linux auditd); (4) Apply principle of least privilege to service accounts running Visual Composer, restricting file system access to only necessary directories; (5) If patching is delayed, disable or restrict network access to Visual Composer design-time interfaces; (6) Review and strengthen authentication mechanisms for Visual Composer administrative interfaces (multi-factor authentication for privileged accounts). Vendor advisory: Await SAP Security Patch Day release notes or search SAP Service Marketplace (support.sap.com) for vulnerability resolution details.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +38
POC: 0

Share

CVE-2025-42977 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy