CVE-2025-31324
SAP NetWeaver Unrestricted File Upload Vulnerability - [Actively Exploited]
Description
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
INFO
Published Date :
April 24, 2025, 5:15 p.m.
Last Modified :
May 6, 2025, 8:59 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
SAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
https://me.sap.com/notes/3594142 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31324
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | CRITICAL | [email protected] | ||||
CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Implement strict authorization checks for metadata uploads.
- Restrict access to the Visual Composer Metadata Uploader.
- Review and enforce file type validation rules.
Public PoC/Exploit Available at Github
CVE-2025-31324 has a 33 public
PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-31324
.
URL | Resource |
---|---|
https://me.sap.com/notes/3594142 | Permissions Required |
https://url.sap/sapsecuritypatchday | Vendor Advisory |
https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ | Third Party Advisory |
https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/ | Press/Media Coverage |
https://www.theregister.com/2025/04/25/sap_netweaver_patch/ | Press/Media Coverage |
https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ | Third Party Advisory |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-31324
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-31324
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Python Shell
sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324
Python
SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC
Python
sap-netweaver-cve-2025-31324-check
None
Python Java
Research Purposes only
Java Python
CVE-2025-31324 & CVE-2025-42999 vulnerability and compromise assessment tool
cve-2025-31324 insecure-deserialization sap-netweaver security-tools cve-2025-42999 missing-authorization-check vcframework
Python
A Python-based security scanner for identifying the CVE-2025-31324 vulnerability in SAP Visual Composer systems, and detecting known Indicators of Compromise (IOCs) such as malicious .jsp.
Python
🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324.
Shell PowerShell
A totally unauthenticated file-upload endpoint in Visual Composer lets anyone drop arbitrary files (e.g., a JSP web-shell) onto the server.
Java Python
Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324
Python
Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader
Python
Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader
Java Python Shell
Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader
Python Java Shell
SAP NetWeaver Unauthenticated Remote Code Execution
Python
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-31324
vulnerability anywhere in the article.

-
Daily CyberSecurity
Kaspersky Report: Vulnerabilities Are Exploding, and Attackers Are Adapting
Kaspersky Labs has published its Q2 2025 vulnerability analysis, revealing an alarming rise in both the number of vulnerabilities registered and their exploitation in the wild. The findings show that ... Read more

-
Kaspersky
Exploits and vulnerabilities in Q2 2025
Vulnerability registrations in Q2 2025 proved to be quite dynamic. Vulnerabilities that were published impact the security of nearly every computer subsystem: UEFI, drivers, operating systems, browser ... Read more

-
CybersecurityNews
Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks
This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront, Apple rushed out emergency patches for yet another zero-d ... Read more

-
Help Net Security
Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by millions are covertly connected AND insecure Three families of Android VPN ap ... Read more

-
Daily CyberSecurity
CVE-2025-55746: Critical Directus Flaw Exposes Servers to Unauthenticated File Upload and RCE
The Directus project has disclosed a critical vulnerability tracked as CVE-2025-55746 (CVSS 9.3) that could allow unauthenticated attackers to upload or modify files on vulnerable servers. Directus, a ... Read more

-
Help Net Security
Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)
Apple has fixed yet another vulnerability (CVE-2025-43300) that has apparently been exploited as a zero-day “in an extremely sophisticated attack against specific targeted individuals.” About CVE-2025 ... Read more

-
Help Net Security
Commvault plugs holes in backup suite that allow remote code execution
Commvault has fixed four security vulnerabilities that may allow unauthenticated attackers to compromise on-premises deployments of its flagship backup and replication suite. Technical details about t ... Read more

-
Help Net Security
Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)
A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has been made public by VX Underground, Onap ... Read more

-
CybersecurityNews
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers
Key Takeaways1. ShinyHunters publicly released exploits for critical SAP vulnerabilities.2. Unauthenticated attackers can achieve complete system takeover and remote code execution.3. Immediately appl ... Read more

-
The Hacker News
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution
Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk o ... Read more

-
CybersecurityNews
Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack
Welcome to this week’s edition of Cybersecurity News Recap! In this issue, we bring you the latest updates and critical developments across the threat landscape. Stay ahead of risks with key insights ... Read more

-
The Hacker News
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware
Jul 30, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack ... Read more

-
CybersecurityNews
Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware
A sophisticated cyberattack targeting a US-based chemicals company has revealed the first observed pairing of SAP NetWeaver exploitation with Auto-Color malware, demonstrating how threat actors are le ... Read more

-
BleepingComputer
Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
Hackers were spotted exploiting a critical SAP NetWeaver vulnerability tracked as CVE-2025-31324 to deploy the Auto-Color Linux malware in a cyberattack on a U.S.-based chemicals company. Cybersecurit ... Read more

-
Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SAP NetWeaver Vulnerability Used in Auto-Color Malware Attack on US Firm
Darktrace, a leading cybersecurity research firm, has identified what is believed to be the first documented instance of threat actors exploiting a critical SAP NetWeaver vulnerability (CVE-2025-31324 ... Read more

-
Daily CyberSecurity
SAP’s July 2025 Patch Day Brings 27 New Notes, Multiple Critical RCE & Deserialization Flaws (CVSS 10.0)
SAP’s July 2025 Security Patch Day delivered a total of 27 new security notes and 3 updates to previously released advisories, with several critical vulnerabilities requiring immediate attention. Thes ... Read more

-
Daily CyberSecurity
Citrix Bleed 2: ReliaQuest Warns of Active Exploitation in NetScaler Gateway Vulnerability
A newly discovered vulnerability—CVE-2025-5777, now dubbed Citrix Bleed 2—is raising serious security alarms. According to ReliaQuest, attackers are actively exploiting this vulnerability in the wild ... Read more

-
The Register
Citrix bleeds again: This time a zero-day exploited - patch now
Hot on the heels of patching a critical bug in Citrix-owned Netscaler ADC and NetScaler Gateway that one security researcher dubbed "CitrixBleed 2," the embattled networking device vendor today issued ... Read more

-
security.nl
SAP waarschuwt voor nieuwe kritieke NetWeaver-kwetsbaarheid
SAP waarschuwt opnieuw voor een kritieke kwetsbaarheid in NetWeaver en heeft updates uitgebracht om het probleem te verhelpen. De software blijkt noodzakelijke autorisatiecontroles voor geauthenticeer ... Read more

-
Daily CyberSecurity
SAP Patch Fixes Critical CVSS 9.6 Flaw in NetWeaver: Privilege Escalation and System Integrity at Risk
SAP’s June 2025 Security Patch Day addressed a total of 14 new vulnerabilities, including a critical issue and several high-severity flaws that demand immediate attention from enterprises relying on S ... Read more
The following table lists the changes that have been made to the
CVE-2025-31324
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
May. 06, 2025
Action Type Old Value New Value -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
May. 02, 2025
Action Type Old Value New Value Added Reference https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ -
Initial Analysis by [email protected]
May. 02, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CPE Configuration OR *cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:* Added Reference Type SAP SE: https://me.sap.com/notes/3594142 Types: Permissions Required Added Reference Type CISA-ADP: https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Types: Third Party Advisory Added Reference Type SAP SE: https://url.sap/sapsecuritypatchday Types: Vendor Advisory Added Reference Type CVE: https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/ Types: Press/Media Coverage Added Reference Type CVE: https://www.theregister.com/2025/04/25/sap_netweaver_patch/ Types: Press/Media Coverage -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
May. 01, 2025
Action Type Old Value New Value Added Reference https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ -
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
Apr. 30, 2025
Action Type Old Value New Value Added Date Added 2025-04-29 Added Due Date 2025-05-20 Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Added Vulnerability Name SAP NetWeaver Unrestricted File Upload Vulnerability -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Apr. 26, 2025
Action Type Old Value New Value Added Reference https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/ Added Reference https://www.theregister.com/2025/04/25/sap_netweaver_patch/ -
New CVE Received by [email protected]
Apr. 24, 2025
Action Type Old Value New Value Added Description SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Added CWE CWE-434 Added Reference https://me.sap.com/notes/3594142 Added Reference https://url.sap/sapsecuritypatchday