First published: Tue Apr 22 2025(Updated: )
SAP Learning Solution is vulnerable to Cross-Site Request Forgery (CSRF), allowing an attacker to trick authenticated user into sending unintended requests to the server. GET-based OData function is named in a way that it violates the expected behaviour. This issue could impact both the confidentiality and integrity of the application without affecting the availability.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP S/4HANA (Learning Solution) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31328 is classified as a high severity vulnerability due to its potential to exploit Cross-Site Request Forgery (CSRF) attacks.
To remediate CVE-2025-31328, apply the latest security updates and patches provided by SAP for the Learning Solution.
CVE-2025-31328 could allow an attacker to execute unintended commands as an authenticated user in SAP S/4 HANA.
CVE-2025-31328 affects the SAP S/4 HANA Learning Solution specifically.
In the context of CVE-2025-31328, CSRF refers to a vulnerability that allows an attacker to exploit the trust between an authenticated user and the application by sending unauthorized requests.