Monday, May 5, 2025
HomeCVE/vulnerabilitySAP Security Update Released to Fix Multiple Vulnerabilities

SAP Security Update Released to Fix Multiple Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

SAP announced 21 new Security Notes and updates to 3 previously released notes on its latest Security Patch Day.

This release addresses critical vulnerabilities within SAP products, underscoring the company’s commitment to safeguarding enterprise software.

SAP strongly recommends customers prioritize implementing these patches to secure their systems and mitigate potential risks.

- Advertisement - Google News

Key Vulnerabilities Addressed

The updates focus on fixing high-priority vulnerabilities that could allow attackers to compromise systems or escalate privileges.

Below is a detailed table summarizing the CVEs and associated Security Notes:

CVE-IDTitleProduct / VersionPriority
[CVE-2025-27434]Cross-Site Scripting (XSS) vulnerability in SAP Commerce (Swagger UI)SAP Commerce (Swagger UI), Version – COM_CLOUD 2211High
[CVE-2025-26661]Missing Authorization check in SAP NetWeaver (ABAP Class Builder)SAP NetWeaver (ABAP Class Builder), Versions – SAP_BASIS 700 to 914High
[CVE-2024-38286]Multiple vulnerabilities in Apache Tomcat within SAP Commerce CloudRelated to CVE-2024-52316; SAP Commerce Cloud, Versions – HY-COM 2205, COM-CLOUD 2211High
[CVE-2025-24876] (Update)Authentication bypass via authorization code injection in SAP ApprouterLibrary – @sap/approuter, Versions – 2.6.1 to 16.7.1High
[CVE-2024-39592] (Update)Missing Authorization check in SAP PDCESAP PDCE, Versions – S4CORE 102 to 108High

Highlights of the Security Notes

  1. Cross-Site Scripting (XSS) Vulnerability in SAP Commerce
    A critical XSS vulnerability ([CVE-2025-27434]) in SAP Commerce’s Swagger UI could allow attackers to execute malicious scripts in users’ browsers. With a CVSS score of 8.8, SAP urges customers to patch this flaw immediately.
  2. Missing Authorization Check in SAP NetWeaver
    Another high-scoring vulnerability ([CVE-2025-26661]), found in several SAP_BASIS versions, could lead to unauthorized access within the ABAP Class Builder component, posing threats to sensitive system data.
  3. Apache Tomcat Vulnerabilities
    The Security Note ([CVE-2024-38286]) addresses multiple vulnerabilities related to Apache Tomcat in SAP Commerce Cloud, with related CVE-2024-52316. These flaws can lead to unauthenticated code execution or privilege escalation.
  4. Updates to Previously Released Notes
    Updates to earlier Security Notes include [CVE-2025-24876] affecting SAP Approuter and [CVE-2024-39592] targeting SAP PDCE. These updates close gaps in prior patches, ensuring enhanced security.

SAP customers are advised to:

  • Visit the SAP Support Portal to access the Security Notes.
  • Apply patches without delay to secure their systems.
  • Review affected systems for potential impacts from the vulnerabilities.

SAP’s March 2025 Security Patch Day reaffirms its ongoing efforts to strengthen enterprise security.

Businesses relying on SAP products must prioritize these updates to protect against exploitation and maintain the integrity of their systems.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems...

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...

RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals

The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems...

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...