SAP April 2025 Update Fixes Critical Code Injection Vulnerabilities

SAP Security Patch Day has introduced a critical update to address vulnerabilities in SAP products, including high-severity code injection weaknesses.

A total of 18 new Security Notes, along with 2 updates to existing notes, were released to tackle serious risks such as unauthorized access, code injection, and directory traversal.

SAP recommends customers promptly apply these patches to safeguard their systems and ensure the robustness of their SAP landscapes.

Summary of CVEs and Vulnerabilities

The following table provides a detailed overview of the vulnerabilities addressed in the April 2025 update:

CVE IDVulnerabilityAffected Product(s)PriorityCVSS Score
CVE-2025-27429Code Injection VulnerabilitySAP S/4HANA (Private Cloud)Critical9.9
CVE-2025-31330Code Injection VulnerabilitySAP Landscape Transformation (Analysis Platform)Critical9.9
CVE-2025-30016Authentication Bypass VulnerabilitySAP Financial ConsolidationCritical9.8
CVE-2025-0064Improper Authorization (Updated Security Note from February 2025 Patch Day)SAP BusinessObjects Business Intelligence platform (Central Management Console)High8.8
CVE-2025-23186Mixed Dynamic RFC Destination Vulnerability via Remote Function Call (RFC)SAP NetWeaver Application Server ABAPHigh8.5
CVE-2024-56337Time-of-Check Time-of-Use (TOCTOU) Race Condition VulnerabilityApache Tomcat within SAP Commerce CloudHigh8.1
CVE-2025-30014Directory Traversal VulnerabilitySAP Capital Yield Tax ManagementHigh7.7
CVE-2025-27428Directory Traversal VulnerabilitySAP NetWeaver and ABAP Platform (Service Data Collection)High7.7

Among the vulnerabilities, CVE-2025-27429 and CVE-2025-31330 stand out due to their critical nature.

These code injection weaknesses enable attackers to execute harmful code, potentially compromising sensitive data and system integrity.

For organizations using SAP S/4HANA (Private Cloud) or SAP Landscape Transformation (Analysis Platform), applying these updates is essential to avoid exploitation.

The patch release also addressed directory traversal vulnerabilities (CVE-2025-30014, CVE-2025-27428) that allow unauthorized access to restricted directories, along with a TOCTOU race condition vulnerability (CVE-2024-56337) found in Apache Tomcat within SAP Commerce Cloud.

SAP’s April 2025 Security Patch Day emphasizes the importance of proactively addressing vulnerabilities to maintain operational resiliency and cybersecurity robustness.

Customers are strongly urged to apply the fixes immediately by consulting SAP’s Support Portal for detailed guidance.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…

2 hours ago

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…

2 hours ago

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

3 hours ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

4 hours ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

4 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

5 hours ago