First published: Tue Mar 11 2025(Updated: )
Due to missing authorization check, SAP NetWeaver (ABAP Class Builder) allows an attacker to gain higher access levels than they should have, resulting in escalation of privileges. On successful exploitation, this could result in disclosure of highly sensitive information. It could also have a high impact on the integrity and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26661 is classified as a high-severity vulnerability due to its potential for privilege escalation.
To fix CVE-2025-26661, apply the latest security patches and updates provided by SAP for NetWeaver.
Exploitation of CVE-2025-26661 could lead to unauthorized access and disclosure of sensitive information.
CVE-2025-26661 affects users of SAP NetWeaver, specifically those utilizing the ABAP Class Builder component.
Currently, the best approach for mitigating CVE-2025-26661 is to ensure the application of security patches rather than relying on workarounds.