Search Icon

SAP Security Notes Review: October 2025

30 October 2025

banner image

Overview

SAP’s security patch day for October 2025 has seen the release of 19 OSS SAP security notes. Four notes have been classified as critical, two as high, eleven as medium, and two as low based on CVSS v3.0 Rating.

Security Notes by CVSS v3 Base Score

SAP-Security-notes-October-base-score

Two notes have been released for:

  • SAP NetWeaver AS Java

Single notes have been released for:

• SAP BusinessObjects Web Intelligence
• SAP Sales and Service Cloud
• SAP NetWeaver
• SAP Supplier Relationship Management
• SAP Solution Manager
• SAP S/4HANA Central Procurement
• SAP Collections and DI
• SAP Version Control Management
• SAP Print and Spool Control
• SAP Security
• SAP Fiori Apps for AR-PP
• SAP Sales and Service Cloud Integration Hub
• SAP NetWeaver
• SAP Cross-Application GTF
• SAP Frontend Services
• SAP ABAP Runtime
• SAP Sales and Service Cloud

Security Notes by Product Category

Vulnerabilities: October 2025 Highlights

[CVE-2025-42942] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server for ABAP (SAP Note 3597355 )

SAP NetWeaver Application Server for ABAP has cross-site scripting vulnerability. Due to this, an unauthenticated attacker could craft a URL embedded with malicious script and trick an unauthenticated victim to click on it to execute the script. Upon successful exploitation, the attacker could access and modify limited information within the scope of victim’s browser. This vulnerability has no impact on availability of the application.

 [CVE-2025-42911] Missing Authorization check in SAP NetWeaver (Service Data Download) (SAP note 3627644)

SAP NetWeaver (Service Data Download) allows an authenticated user to call a remote-enabled function module, which could grant access to information about the SAP system and operating system. This leads to a low impact on confidentiality, with no effect on the integrity and availability of the application

[CVE-2025-42901] Code Injection vulnerability in SAP Application Server for ABAP (BAPI Browser) (SAP note 3652788)

SAP Application Server for ABAP allows an authenticated attacker to store malicious JavaScript payloads which could be executed in victim user’s browser when accessing the affected functionality of BAPI explorer. This has low impact on confidentiality and integrity with no impact on availability of the application.

[CVE-2025-31331] Authorization Bypass vulnerability in SAP NetWeaver (SAP Note 3577131)

SAP NetWeaver allows an attacker to bypass authorization checks, enabling them to view portions of ABAP code that would normally require additional validation. Once logged into the ABAP system, the attacker can run a specific transaction that exposes sensitive system code without proper authorization. This vulnerability compromises the confidentiality.

About this Review

On the second Tuesday of each month, SAP release security updates to their software products. At Applexus, we analyse all of the released security updates and produce this security review, including sending bespoke recommendations for each of our managed service customers.

There is more information on how we handle SAP security updates, including information on SAP’s process, the CVE process and the CVSS base scores in our earlier article on addressing security vulnerabilities in SAP software.

Related Blogs

cloud-erp-for-uk-retailers-blog-banner

31 March 2026

Why UK Retailers Can’t Afford to Wait on Cloud ERP

Business Case for SAP S4HANA in the Age of AI Banner

24 March 2026

Business Case for SAP S4HANA in the Age of AI

17 November 2025

SAP Security Notes Review: November 2025

Modern ERP system streamlining fashion and retail operations across channels

10 November 2025

Why Modern ERP is No Longer Optional for Fashion & Retail Success

04 November 2025

Choosing the Right S/4HANA Migration for Mid-Market Companies

25 September 2025

Making S/4HANA Migration Simple for Mid-Market Businesses with MVP+

12 August 2025

SAP Security Notes Review: August 2025

Clean core blog banner

18 June 2025

Why Clean Core for your Journey to RISE and AI