CVE-2025-42893
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-12
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | business_connector | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Open Redirect issue in SAP Business Connector where an attacker can create a malicious URL. If a victim clicks this URL, they are redirected to an attacker-controlled site displayed within an embedded frame. This can lead to theft of sensitive information and unauthorized actions by the attacker, affecting the confidentiality and integrity of the victim's web client data.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to steal sensitive information and perform unauthorized actions on your web client data. This compromises the confidentiality and integrity of your data. However, it does not affect system availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability could negatively affect compliance with standards like GDPR and HIPAA because it risks unauthorized access to sensitive information, thereby impacting data confidentiality and integrity requirements mandated by these regulations.