5.4
CVE-2025-42901
- EPSS 0.03%
- Veröffentlicht 14.10.2025 00:17:23
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle cna@sap.com
- CVE-Watchlists
- Unerledigt
Code Injection vulnerability in SAP Application Server for ABAP (BAPI Browser)
SAP Application Server for ABAP allows an authenticated attacker to store malicious JavaScript payloads which could be executed in victim user's browser when accessing the affected functionality of BAPI explorer. This has low impact on confidentiality and integrity with no impact on availability of the application.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSAP_SE
≫
Produkt
SAP Application Server for ABAP (BAPI Browser)
Default Statusunaffected
Version
SAP_BASIS 700
Status
affected
Version
SAP_BASIS 701
Status
affected
Version
SAP_BASIS 702
Status
affected
Version
SAP_BASIS 731
Status
affected
Version
SAP_BASIS 740
Status
affected
Version
SAP_BASIS 750
Status
affected
Version
SAP_BASIS 751
Status
affected
Version
SAP_BASIS 752
Status
affected
Version
SAP_BASIS 753
Status
affected
Version
SAP_BASIS 754
Status
affected
Version
SAP_BASIS 755
Status
affected
Version
SAP_BASIS 756
Status
affected
Version
SAP_BASIS 757
Status
affected
Version
SAP_BASIS 758
Status
affected
Version
SAP_BASIS 816
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cna@sap.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.