SAP has released its August 2025 security patch package containing 19 security notes addressing critical vulnerabilities across enterprise SAP environments. This release includes three HotNews vulnerabilities with maximum CVSS 9.9 ratings, two High priority issues, twelve Medium priority fixes, and two Low priority updates. The security patches affect core components including SAP S/4HANA (LT/DT modules), NetWeaver AS ABAP (ICF/ICM), SAP GUI (Windows/HTML), Fiori Launchpad, SAP Cloud Connector, and SAP Business One (SLD).
Total Security Notes 19
HotNews Critical 3
High Priority 2
Medium Priority 12
Low Priority 2
🎯 Executive Summary
Critical Code Execution Vulnerabilities: Three HotNews vulnerabilities (CVE-2025-42950, CVE-2025-42957, CVE-2025-27429) with CVSS 9.9 ratings require immediate emergency patching across Analysis Platform and SAP S/4HANA environments.
Authorization Control Failures: Multiple high-impact authorization bypass vulnerabilities in SAP Business One SLD and NetWeaver AS ABAP BIC Document components pose significant security risks.
Common Attack Vectors: Prevalent security weaknesses include insufficient authorization controls, cross-site scripting (XSS), HTML injection attacks, information disclosure, directory traversal, CRLF injection, and reverse tabnabbing vulnerabilities.
🚨 Critical HotNews Vulnerabilities
Remote Code Execution in Analysis Platform
9.9CVE-2025-42950CA-LT-ANACode Injection
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Critical remote code execution vulnerability in SAP Analysis Platform allowing authenticated attackers with minimal privileges to execute arbitrary system commands with elevated permissions, potentially leading to complete system compromise.
SAP Note 3633838 — Deploy emergency patch immediately within 48 hours
Code Injection in S/4HANA Private Cloud Environment
9.9CVE-2025-42957CA-DT-ANACode Injection
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severe code injection vulnerability in SAP S/4HANA Private Cloud and On-Premise Data Transformation Analytics module. Exploitation enables remote attackers to execute malicious code, compromising data confidentiality, system integrity, and service availability across connected environments.
SAP Note 3627998 — Critical patch deployment required immediately
Previously identified critical vulnerability (originally disclosed April 2025) with updated security patch in August release. This code injection flaw in Live Analytics component requires immediate attention to prevent continued exploitation risks.
SAP Note 3581961 — Verify patch installation (Updated: August 12, 2025)
⚠️ High Priority Security Issues
Authorization Bypass in Business One SLD
8.8CVE-2025-42951SBO-BC-SLDBroken Authorization
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Fundamental authorization control failure in SAP Business One System Landscape Directory (SLD) component. Low-privileged authenticated users can bypass security controls to perform administrative operations, potentially accessing sensitive business data and modifying critical system configurations.
SAP Note 3625403 — Schedule deployment within 14-day maintenance window
Complex security vulnerability cluster affecting NetWeaver AS ABAP Business Intelligence Consumer (BIC) Document processing. Multiple attack vectors enable unauthorized access to sensitive financial reporting data and potential service disruption in corporate performance management systems.
Reflected XSS vulnerability in Customer Relationship Management Business Framework Machine Learning components. Malicious script injection can compromise user sessions and enable phishing attacks targeting CRM system users.
HTML injection vulnerability in SAP GUI for HTML frontend component allowing insertion of malicious markup content. Attackers can manipulate web interface rendering to conduct social engineering attacks against authenticated users.
Information leakage vulnerability in GUI for HTML component (originally identified January 2025, updated in August release). Local privileged users can access sensitive system information beyond intended authorization scope.
Authorization control deficiency in ABAP Development Workbench Utilities Business Rule Repository. High-privilege users can access confidential system information without proper authorization validation, potentially exposing sensitive configuration data.
Information leakage vulnerability in SAP GUI for Windows client requiring high-privilege access and user interaction. Sensitive system data may be exposed through improper information handling in the client interface.
Carriage Return Line Feed (CRLF) injection vulnerability in Document Management Service Supplier Invoice processing component. Authenticated users can inject malicious line breaks to manipulate HTTP headers and response content.
Authorization bypass vulnerability in NetWeaver Test Suite Global Memory Area component (originally identified April 2025, updated August 2025). Low-privilege users can access restricted testing information beyond authorized scope.
Minor authorization validation deficiency in SAP Cloud Connector middleware component. Local network authenticated users may cause limited service disruption through improper access control validation with minimal impact on system availability.
Reverse tabnabbing vulnerability in Fiori Launchpad Core Frontend component. High-privilege users clicking external links may be susceptible to tab hijacking attacks, potentially enabling phishing campaigns targeting SAP user credentials.
Discover vulnerabilities through the eyes of an attacker In today’s digital landscape, SAP systems form the backbone of critical business operations for