SAP has released its October 2025 security patch package containing 16 security notes addressing critical vulnerabilities across enterprise SAP environments. This release includes four HotNews vulnerabilities with CVSS ratings up to 10.0, two High priority issues, eight Medium priority fixes, and two Low priority updates. The patches affect NetWeaver AS Java, SAP Commerce Cloud, BusinessObjects, Supplier Relationship Management, and various SAP application components.
16
4
2
8
2
Executive Summary
- Maximum Severity Remote Code Execution: CVE-2025-42944 (CVSS 10.0) in NetWeaver RMI-P4 allows unauthenticated attackers to execute arbitrary code through insecure deserialization with complete system compromise.
- Critical Directory Traversal: CVE-2025-42937 (CVSS 9.8) in SAP Print Service enables unauthenticated remote attackers to manipulate files and compromise system integrity and availability.
- High-Risk File Upload: CVE-2025-42910 (CVSS 9.0) in Supplier Relationship Management allows authenticated users to upload malicious files leading to complete system takeover.
- Denial of Service Threats: Multiple DoS vulnerabilities in Commerce Cloud Search and Navigation (CVSS 7.5) and Data Hub Integration Suite (CVSS 7.1) affecting service availability.
Critical HotNews Vulnerabilities
Insecure Deserialization in NetWeaver RMI-P4
Unauthenticated remote code execution via insecure deserialization in NetWeaver AS Java RMI-P4 component. This maximum severity vulnerability allows attackers to execute arbitrary code without authentication, achieving complete system compromise with full confidentiality, integrity, and availability impact across connected environments.
Directory Traversal in SAP Print Service
Critical directory traversal vulnerability in SAP Print Service allows unauthenticated remote attackers to access and manipulate arbitrary files on the system. Attackers can read sensitive data, modify critical files, and disrupt service availability without requiring any authentication.
Unrestricted File Upload in Supplier Relationship Management
Unrestricted file upload vulnerability in SAP Supplier Relationship Management allows authenticated attackers with low privileges to upload malicious files. Successful exploitation leads to remote code execution with complete system compromise across connected environments.
Denial of Service in Commerce Cloud Search
Denial of Service vulnerability in SAP Commerce Cloud Search and Navigation component allows unauthenticated remote attackers to disrupt service availability by consuming system resources or crashing the application.
High Priority Security Issues
Security Misconfiguration in Data Hub Integration Suite
Security misconfiguration in SAP Data Hub Integration Suite allows attackers on adjacent networks to exploit configuration weaknesses. With user interaction, attackers can achieve high impact on confidentiality, integrity, and availability.
Information Disclosure in NetWeaver GUI for HTML
Information disclosure vulnerability in SAP NetWeaver Application Server ABAP applications based on SAP GUI for HTML. High-privileged local users can access sensitive information across system boundaries.
Medium Priority Vulnerabilities
Cross-Site Request Forgery in NetWeaver ABAP
Cross-Site Request Forgery vulnerability in SAP NetWeaver Application Server for ABAP allows authenticated attackers to perform unauthorized actions on behalf of victims.
Code Injection in ABAP BAPI Browser
Code injection vulnerability in SAP Application Server for ABAP BAPI Browser component allows authenticated users to inject malicious code.
Directory Traversal in Commerce Cloud
Directory traversal vulnerability in SAP Commerce Cloud allows unauthenticated attackers to access sensitive files outside intended directories.
Memory Corruption in NetWeaver AS ABAP
Memory corruption vulnerability in SAP NetWeaver AS ABAP and ABAP Platform can lead to denial of service conditions.
Missing Authorization in S/4HANA Bank Statement Processing
Missing authorization check in SAP S/4HANA Manage Processing Rules for Bank Statements Fiori application.
Authorization Bypass in NetWeaver
Authorization bypass vulnerability in SAP NetWeaver allows authenticated users to access information beyond their authorization level.
User Enumeration in Financial Services Claims Management
User enumeration and sensitive data exposure via RFC function in SAP Financial Service Claims Management.
Deserialization in BusinessObjects Web Intelligence
Deserialization vulnerability in SAP BusinessObjects Web Intelligence and Platform Search requiring user interaction.
Low Priority Security Updates
Security Misconfiguration in Cloud Appliance Library
Security misconfiguration vulnerability in SAP Cloud Appliance Library Appliances with limited confidentiality impact.
Security Advisory prepared by RedRays Cybersecurity Team
Based on SAP Security Notes published 14 October 2025.
© 2025 RedRays. Test patches in development environments before production deployment.