First published: Tue Mar 11 2025(Updated: )
SAP NetWeaver Application Server ABAP does not sufficiently encode user-controlled inputs, leading to DOM-basedCross-Site Scripting (XSS) vulnerability. This allows an attacker with no privileges, to craft a malicious web message that exploits WEBGUI functionality. On successful exploitation, the malicious JavaScript payload executes in the scope of victim�s browser potentially compromising their data and/or manipulating browser content. This leads to a limited impact on confidentiality and integrity. There is no impact on availability
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26659 is rated as a medium severity vulnerability due to the potential for exploitation via DOM-based Cross-Site Scripting.
To fix CVE-2025-26659, apply the latest security patch provided by SAP for the NetWeaver Application Server ABAP.
Exploitation of CVE-2025-26659 can allow attackers to execute malicious scripts leading to data theft or session hijacking.
CVE-2025-26659 affects users of the SAP NetWeaver Application Server ABAP that do not have the necessary security patches applied.
Yes, CVE-2025-26659 can be exploited remotely by an attacker who can send crafted web messages to the application.