Known Exploited Vulnerability
10.0
CRITICAL CVSS 3.1
CVE-2025-31324
SAP NetWeaver Unrestricted File Upload Vulnerability - [Actively Exploited]
Description

SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.

INFO

Published Date :

April 24, 2025, 5:15 p.m.

Last Modified :

May 6, 2025, 8:59 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

SAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Notes :

https://me.sap.com/notes/3594142 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31324

Affected Products

The following products are affected by CVE-2025-31324 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Sap netweaver
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 3.1 CRITICAL [email protected]
Solution
Address SAP NetWeaver authorization flaws to prevent unauthorized file uploads.
  • Implement strict authorization checks for metadata uploads.
  • Restrict access to the Visual Composer Metadata Uploader.
  • Review and enforce file type validation rules.
Public PoC/Exploit Available at Github

CVE-2025-31324 has a 33 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-31324.

URL Resource
https://me.sap.com/notes/3594142 Permissions Required
https://url.sap/sapsecuritypatchday Vendor Advisory
https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Third Party Advisory
https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/ Press/Media Coverage
https://www.theregister.com/2025/04/25/sap_netweaver_patch/ Press/Media Coverage
https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-31324 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-31324 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python Shell

Updated: 2 days ago
0 stars 0 fork 0 watcher
Born at : Aug. 20, 2025, 6:30 a.m. This repo has been linked 1 different CVEs too.

sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324

Python

Updated: 1 week, 4 days ago
13 stars 0 fork 0 watcher
Born at : Aug. 15, 2025, 3:45 p.m. This repo has been linked 1 different CVEs too.

SAP NetWeaver Visual Composer Metadata Uploader <= 7.50 CVE-2025-31324 PoC

Python

Updated: 2 months, 2 weeks ago
0 stars 1 fork 1 watcher
Born at : May 10, 2025, 6:52 p.m. This repo has been linked 1 different CVEs too.

sap-netweaver-cve-2025-31324-check

Updated: 3 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : May 8, 2025, 12:57 a.m. This repo has been linked 1 different CVEs too.

None

Python Java

Updated: 1 month, 3 weeks ago
5 stars 3 fork 3 watcher
Born at : May 7, 2025, 6:23 a.m. This repo has been linked 1 different CVEs too.

Research Purposes only

Java Python

Updated: 3 months, 1 week ago
5 stars 0 fork 0 watcher
Born at : May 6, 2025, 4:58 p.m. This repo has been linked 1 different CVEs too.

CVE-2025-31324 & CVE-2025-42999 vulnerability and compromise assessment tool

cve-2025-31324 insecure-deserialization sap-netweaver security-tools cve-2025-42999 missing-authorization-check vcframework

Python

Updated: 2 months, 1 week ago
6 stars 0 fork 0 watcher
Born at : May 1, 2025, 6:44 p.m. This repo has been linked 2 different CVEs too.

A Python-based security scanner for identifying the CVE-2025-31324 vulnerability in SAP Visual Composer systems, and detecting known Indicators of Compromise (IOCs) such as malicious .jsp.

Python

Updated: 3 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : April 30, 2025, 10:31 p.m. This repo has been linked 1 different CVEs too.

🔍 A simple Bash script to detect malicious JSP webshells, including those used in exploits of SAP NetWeaver CVE-2025-31324.

Shell PowerShell

Updated: 4 months ago
0 stars 0 fork 0 watcher
Born at : April 30, 2025, 3:38 p.m. This repo has been linked 1 different CVEs too.

A totally unauthenticated file-upload endpoint in Visual Composer lets anyone drop arbitrary files (e.g., a JSP web-shell) onto the server.

Java Python

Updated: 3 months, 4 weeks ago
1 stars 0 fork 0 watcher
Born at : April 30, 2025, 1:39 p.m. This repo has been linked 1 different CVEs too.

Python-based Burp Suite extension is designed to detect the presence of CVE-2025-31324

Python

Updated: 4 months ago
0 stars 0 fork 0 watcher
Born at : April 30, 2025, 6:34 a.m. This repo has been linked 1 different CVEs too.

Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader

Python

Updated: 4 months ago
0 stars 0 fork 0 watcher
Born at : April 29, 2025, 9:46 a.m. This repo has been linked 1 different CVEs too.

Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader

Java Python Shell

Updated: 4 months ago
0 stars 1 fork 1 watcher
Born at : April 29, 2025, 12:16 a.m. This repo has been linked 1 different CVEs too.

Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader

Python Java Shell

Updated: 3 months, 2 weeks ago
3 stars 1 fork 1 watcher
Born at : April 28, 2025, 8:32 p.m. This repo has been linked 1 different CVEs too.

SAP NetWeaver Unauthenticated Remote Code Execution

Python

Updated: 4 months ago
0 stars 0 fork 0 watcher
Born at : April 28, 2025, 1:19 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-31324 vulnerability anywhere in the article.

  • Daily CyberSecurity
Kaspersky Report: Vulnerabilities Are Exploding, and Attackers Are Adapting

Kaspersky Labs has published its Q2 2025 vulnerability analysis, revealing an alarming rise in both the number of vulnerabilities registered and their exploitation in the wild. The findings show that ... Read more

Published Date: Aug 29, 2025 (4 days, 21 hours ago)
  • Kaspersky
Exploits and vulnerabilities in Q2 2025

Vulnerability registrations in Q2 2025 proved to be quite dynamic. Vulnerabilities that were published impact the security of nearly every computer subsystem: UEFI, drivers, operating systems, browser ... Read more

Published Date: Aug 27, 2025 (6 days, 11 hours ago)
  • CybersecurityNews
Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks

This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront, Apple rushed out emergency patches for yet another zero-d ... Read more

Published Date: Aug 24, 2025 (1 week, 2 days ago)
  • Help Net Security
Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by millions are covertly connected AND insecure Three families of Android VPN ap ... Read more

Published Date: Aug 24, 2025 (1 week, 2 days ago)
  • Daily CyberSecurity
CVE-2025-55746: Critical Directus Flaw Exposes Servers to Unauthenticated File Upload and RCE

The Directus project has disclosed a critical vulnerability tracked as CVE-2025-55746 (CVSS 9.3) that could allow unauthenticated attackers to upload or modify files on vulnerable servers. Directus, a ... Read more

Published Date: Aug 22, 2025 (1 week, 4 days ago)
  • Help Net Security
Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)

Apple has fixed yet another vulnerability (CVE-2025-43300) that has apparently been exploited as a zero-day “in an extremely sophisticated attack against specific targeted individuals.” About CVE-2025 ... Read more

Published Date: Aug 20, 2025 (1 week, 6 days ago)
  • Help Net Security
Commvault plugs holes in backup suite that allow remote code execution

Commvault has fixed four security vulnerabilities that may allow unauthenticated attackers to compromise on-premises deployments of its flagship backup and replication suite. Technical details about t ... Read more

Published Date: Aug 20, 2025 (1 week, 6 days ago)
  • Help Net Security
Exploit for critical SAP Netweaver flaws released (CVE-2025-31324, CVE-2025-42999)

A working exploit concatenating two critical SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) that have been previously exploited in the wild has been made public by VX Underground, Onap ... Read more

Published Date: Aug 20, 2025 (1 week, 6 days ago)
  • CybersecurityNews
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

Key Takeaways1. ShinyHunters publicly released exploits for critical SAP vulnerabilities.2. Unauthenticated attackers can achieve complete system takeover and remote code execution.3. Immediately appl ... Read more

Published Date: Aug 19, 2025 (2 weeks ago)
  • The Hacker News
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk o ... Read more

Published Date: Aug 19, 2025 (2 weeks ago)
  • CybersecurityNews
Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack

Welcome to this week’s edition of Cybersecurity News Recap! In this issue, we bring you the latest updates and critical developments across the threat landscape. Stay ahead of risks with key insights ... Read more

Published Date: Aug 03, 2025 (4 weeks, 2 days ago)
  • The Hacker News
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

Jul 30, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack ... Read more

Published Date: Jul 30, 2025 (1 month ago)
  • CybersecurityNews
Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware

A sophisticated cyberattack targeting a US-based chemicals company has revealed the first observed pairing of SAP NetWeaver exploitation with Auto-Color malware, demonstrating how threat actors are le ... Read more

Published Date: Jul 30, 2025 (1 month ago)
  • BleepingComputer
Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware

Hackers were spotted exploiting a critical SAP NetWeaver vulnerability tracked as CVE-2025-31324 to deploy the Auto-Color Linux malware in a cyberattack on a U.S.-based chemicals company. Cybersecurit ... Read more

Published Date: Jul 29, 2025 (1 month ago)
  • Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SAP NetWeaver Vulnerability Used in Auto-Color Malware Attack on US Firm

Darktrace, a leading cybersecurity research firm, has identified what is believed to be the first documented instance of threat actors exploiting a critical SAP NetWeaver vulnerability (CVE-2025-31324 ... Read more

Published Date: Jul 29, 2025 (1 month ago)
  • Daily CyberSecurity
SAP’s July 2025 Patch Day Brings 27 New Notes, Multiple Critical RCE & Deserialization Flaws (CVSS 10.0)

SAP’s July 2025 Security Patch Day delivered a total of 27 new security notes and 3 updates to previously released advisories, with several critical vulnerabilities requiring immediate attention. Thes ... Read more

Published Date: Jul 08, 2025 (1 month, 3 weeks ago)
  • Daily CyberSecurity
Citrix Bleed 2: ReliaQuest Warns of Active Exploitation in NetScaler Gateway Vulnerability

A newly discovered vulnerability—CVE-2025-5777, now dubbed Citrix Bleed 2—is raising serious security alarms. According to ReliaQuest, attackers are actively exploiting this vulnerability in the wild ... Read more

Published Date: Jun 30, 2025 (2 months ago)
  • The Register
Citrix bleeds again: This time a zero-day exploited - patch now

Hot on the heels of patching a critical bug in Citrix-owned Netscaler ADC and NetScaler Gateway that one security researcher dubbed "CitrixBleed 2," the embattled networking device vendor today issued ... Read more

Published Date: Jun 25, 2025 (2 months, 1 week ago)
  • security.nl
SAP waarschuwt voor nieuwe kritieke NetWeaver-kwetsbaarheid

SAP waarschuwt opnieuw voor een kritieke kwetsbaarheid in NetWeaver en heeft updates uitgebracht om het probleem te verhelpen. De software blijkt noodzakelijke autorisatiecontroles voor geauthenticeer ... Read more

Published Date: Jun 10, 2025 (2 months, 3 weeks ago)
  • Daily CyberSecurity
SAP Patch Fixes Critical CVSS 9.6 Flaw in NetWeaver: Privilege Escalation and System Integrity at Risk

SAP’s June 2025 Security Patch Day addressed a total of 14 new vulnerabilities, including a critical issue and several high-severity flaws that demand immediate attention from enterprises relying on S ... Read more

Published Date: Jun 10, 2025 (2 months, 3 weeks ago)

The following table lists the changes that have been made to the CVE-2025-31324 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    May. 06, 2025

    Action Type Old Value New Value
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 02, 2025

    Action Type Old Value New Value
    Added Reference https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
  • Initial Analysis by [email protected]

    May. 02, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CPE Configuration OR *cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*
    Added Reference Type SAP SE: https://me.sap.com/notes/3594142 Types: Permissions Required
    Added Reference Type CISA-ADP: https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Types: Third Party Advisory
    Added Reference Type SAP SE: https://url.sap/sapsecuritypatchday Types: Vendor Advisory
    Added Reference Type CVE: https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/ Types: Press/Media Coverage
    Added Reference Type CVE: https://www.theregister.com/2025/04/25/sap_netweaver_patch/ Types: Press/Media Coverage
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    May. 01, 2025

    Action Type Old Value New Value
    Added Reference https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Apr. 30, 2025

    Action Type Old Value New Value
    Added Date Added 2025-04-29
    Added Due Date 2025-05-20
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name SAP NetWeaver Unrestricted File Upload Vulnerability
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 26, 2025

    Action Type Old Value New Value
    Added Reference https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/
    Added Reference https://www.theregister.com/2025/04/25/sap_netweaver_patch/
  • New CVE Received by [email protected]

    Apr. 24, 2025

    Action Type Old Value New Value
    Added Description SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    Added CWE CWE-434
    Added Reference https://me.sap.com/notes/3594142
    Added Reference https://url.sap/sapsecuritypatchday
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 10
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact