First published: Tue Apr 08 2025(Updated: )
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP S/4HANA (Learning Solution) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27429 is considered a critical severity vulnerability due to its potential to allow unauthorized execution of arbitrary code.
To mitigate CVE-2025-27429, apply the latest security patches provided by SAP for S/4HANA.
CVE-2025-27429 specifically affects SAP S/4HANA implementations that expose certain function modules via RFC.
CVE-2025-27429 can facilitate the injection of arbitrary ABAP code, allowing attackers to bypass authorization checks.
CVE-2025-27429 can be exploited by attackers with user privileges, posing a significant risk to system security.