CVE-2025-42920
Cross-Site Scripting (XSS) vulnerability in SAP Supplier Relationship Management
Description
Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated victim clicks on the link, the injected input is processed during the page generation, resulting in the execution of malicious content. This execution allows the attacker to access and modify information within the victim's browser scope, impacting confidentiality and integrity, while availability remains unaffected.
INFO
Published Date :
Sept. 9, 2025, 2:15 a.m.
Last Modified :
Oct. 24, 2025, 2:50 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source | 
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | e4686d1a-f260-4930-ac4c-2f5c992778dd | ||||
| CVSS 3.1 | MEDIUM | [email protected] | 
Solution
- Apply SAP security notes and updates.
 - Sanitize all user-supplied input.
 - Validate input on the server-side.
 - Encode output to prevent execution.
 
References to Advisories, Solutions, and Tools
                                            Here, you will find a curated list of external links that provide in-depth
                                            information, practical solutions, and valuable tools related to
                                            CVE-2025-42920.
                                        
| URL | Resource | 
|---|---|
| https://me.sap.com/notes/3647098 | Permissions Required | 
| https://url.sap/sapsecuritypatchday | Patch | 
CWE - Common Weakness Enumeration
            While CVE identifies
            specific instances of vulnerabilities, CWE categorizes the common flaws or
            weaknesses that can lead to vulnerabilities. CVE-2025-42920 is
            associated with the following CWEs:
        
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
            (CAPEC)
            stores attack patterns, which are descriptions of the common attributes and
            approaches employed by adversaries to exploit the CVE-2025-42920
            weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
			The following list is the news that have been mention
			CVE-2025-42920 vulnerability anywhere in the article.
		
- 
                                                            
                                                                
The Cyber Express
 
SAP Issues Critical Security Patch for NetWeaver and Other Products, Warns of CVE-2025-42944
SAP has released a new security update addressing a broad range of vulnerabilities across its product ecosystem. Among the most alarming is a critical vulnerability identified in SAP NetWeaver, tracke ... Read more
- 
                                                            
                                                                
CybersecurityNews
 
SAP Security Patch Day September 2025 – 21 Vulnerabilities and 4 Critical One’s Patched
As part of its scheduled security maintenance, SAP released its September 2025 Patch Day notes, addressing a total of 21 new vulnerabilities and providing updates to four previously released security ... Read more
                The following table lists the changes that have been made to the
                CVE-2025-42920 vulnerability over time.
            
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
- 
                            
Initial Analysis by [email protected]
Oct. 24, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:sap:supplier_relationship_management:7.0:-:*:*:*:*:*:* Added Reference Type SAP SE: https://me.sap.com/notes/3647098 Types: Permissions Required Added Reference Type SAP SE: https://url.sap/sapsecuritypatchday Types: Patch  - 
                            
New CVE Received by [email protected]
Sep. 09, 2025
Action Type Old Value New Value Added Description Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated victim clicks on the link, the injected input is processed during the page generation, resulting in the execution of malicious content. This execution allows the attacker to access and modify information within the victim's browser scope, impacting confidentiality and integrity, while availability remains unaffected. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Added CWE CWE-79 Added Reference https://me.sap.com/notes/3647098 Added Reference https://url.sap/sapsecuritypatchday