First published: Tue Feb 11 2025(Updated: )
Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Fiori Apps for Travel Management in SAP ERP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23191 is classified as a high severity vulnerability due to the potential for attacker exploitation.
To fix CVE-2025-23191, update to the latest patches provided by SAP for Fiori for SAP ERP.
CVE-2025-23191 allows for the poisoning of cached values in OData endpoints, potentially redirecting users to malicious links.
Yes, CVE-2025-23191 can be easily exploited by manipulating the Host header in HTTP GET requests.
CVE-2025-23191 impacts all versions of SAP Fiori for SAP ERP that do not have the latest security patches.