CVE-2025-42894
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-12
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | business_connector | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to a complete compromise of the confidentiality, integrity, and availability of the affected system, allowing an attacker to manipulate files and execute commands on the server.
Can you explain this vulnerability to me?
This vulnerability is a Path Traversal flaw in SAP Business Connector that allows an attacker authenticated as an administrator with adjacent access to read, write, overwrite, and delete arbitrary files on the host system. Exploiting this vulnerability could also enable the attacker to execute arbitrary operating system commands on the server.