First published: Tue Apr 08 2025(Updated: )
SAP NetWeaver allows an attacker to bypass authorization checks, enabling them to view portions of ABAP code that would normally require additional validation. Once logged into the ABAP system, the attacker can run a specific transaction that exposes sensitive system code without proper authorization. This vulnerability compromises the confidentiality.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31331 has been classified with a high severity due to the potential exposure of sensitive ABAP code.
To mitigate CVE-2025-31331, ensure that all authorization checks are correctly implemented and regularly update SAP NetWeaver with the latest security patches.
Exploiting CVE-2025-31331 may allow unauthorized users to view sensitive system code, potentially compromising the integrity of the SAP environment.
CVE-2025-31331 affects users of SAP NetWeaver, particularly those with insufficient authorization controls.
Immediately review your authorization settings in SAP NetWeaver and apply the latest security patches to address CVE-2025-31331.