SAP announced 21 new Security Notes and updates to 3 previously released notes on its latest Security Patch Day.
This release addresses critical vulnerabilities within SAP products, underscoring the company’s commitment to safeguarding enterprise software.
SAP strongly recommends customers prioritize implementing these patches to secure their systems and mitigate potential risks.
Key Vulnerabilities Addressed
The updates focus on fixing high-priority vulnerabilities that could allow attackers to compromise systems or escalate privileges.
Below is a detailed table summarizing the CVEs and associated Security Notes:
CVE-ID | Title | Product / Version | Priority |
[CVE-2025-27434] | Cross-Site Scripting (XSS) vulnerability in SAP Commerce (Swagger UI) | SAP Commerce (Swagger UI), Version – COM_CLOUD 2211 | High |
[CVE-2025-26661] | Missing Authorization check in SAP NetWeaver (ABAP Class Builder) | SAP NetWeaver (ABAP Class Builder), Versions – SAP_BASIS 700 to 914 | High |
[CVE-2024-38286] | Multiple vulnerabilities in Apache Tomcat within SAP Commerce Cloud | Related to CVE-2024-52316; SAP Commerce Cloud, Versions – HY-COM 2205, COM-CLOUD 2211 | High |
[CVE-2025-24876] (Update) | Authentication bypass via authorization code injection in SAP Approuter | Library – @sap/approuter, Versions – 2.6.1 to 16.7.1 | High |
[CVE-2024-39592] (Update) | Missing Authorization check in SAP PDCE | SAP PDCE, Versions – S4CORE 102 to 108 | High |
Highlights of the Security Notes
- Cross-Site Scripting (XSS) Vulnerability in SAP Commerce
A critical XSS vulnerability ([CVE-2025-27434]) in SAP Commerce’s Swagger UI could allow attackers to execute malicious scripts in users’ browsers. With a CVSS score of 8.8, SAP urges customers to patch this flaw immediately. - Missing Authorization Check in SAP NetWeaver
Another high-scoring vulnerability ([CVE-2025-26661]), found in several SAP_BASIS versions, could lead to unauthorized access within the ABAP Class Builder component, posing threats to sensitive system data. - Apache Tomcat Vulnerabilities
The Security Note ([CVE-2024-38286]) addresses multiple vulnerabilities related to Apache Tomcat in SAP Commerce Cloud, with related CVE-2024-52316. These flaws can lead to unauthenticated code execution or privilege escalation. - Updates to Previously Released Notes
Updates to earlier Security Notes include [CVE-2025-24876] affecting SAP Approuter and [CVE-2024-39592] targeting SAP PDCE. These updates close gaps in prior patches, ensuring enhanced security.
SAP customers are advised to:
- Visit the SAP Support Portal to access the Security Notes.
- Apply patches without delay to secure their systems.
- Review affected systems for potential impacts from the vulnerabilities.
SAP’s March 2025 Security Patch Day reaffirms its ongoing efforts to strengthen enterprise security.
Businesses relying on SAP products must prioritize these updates to protect against exploitation and maintain the integrity of their systems.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.