Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25243— Path traversal vulnerability in SAP Supplier Relationship Management (Master Data Management Catalog)

CVSS 8.6 · High EPSS 0.26% · P49
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-25243

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path traversal vulnerability in SAP Supplier Relationship Management (Master Data Management Catalog)
Source: NVD (National Vulnerability Database)
Vulnerability Description
SAP Supplier Relationship Management (Master Data Management Catalog) allows an unauthenticated attacker to use a publicly available servlet to download an arbitrary file over the network without any user interaction. This can reveal highly sensitive information with no impact to integrity or availability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP Supplier Relationship Management 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP Supplier Relationship Management(SRM)是德国思爱普(SAP)公司的一套供应商关系管理解决方案。该产品实现了企业内以及供应商之间采购和购置流程的自动化,并提供发票开具等功能。 SAP Supplier Relationship Management存在路径遍历漏洞。攻击者利用该漏洞可以使用公开的 servlet 通过网络下载任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP_SESAP Supplier Relationship Management (Master Data Management Catalog) SRM_MDM_CAT 7.52 -

II. Public POCs for CVE-2025-25243

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-25243

登录查看更多情报信息。

Same Patch Batch · SAP_SE · 2025-02-11 · 17 CVEs total

CVE-2025-00648.7 HIGHImproper Authorization in SAP BusinessObjects Business Intelligence platform (Central Mana
CVE-2025-248768.1 HIGHAuthentication bypass via authorization code injection in SAP Approuter
CVE-2025-248687.1 HIGHOpen Redirect Vulnerability in SAP HANA extended application services, advanced model (Use
CVE-2025-248746.8 MEDIUMMissing Defense in Depth Against Clickjacking in SAP Commerce Backoffice
CVE-2025-248756.8 MEDIUMSameSite Defense in Depth not applied for some cookies in SAP Commerce
CVE-2025-248676.1 MEDIUMCross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence plat
CVE-2025-248706.0 MEDIUMInsecure Key & Secret Management vulnerability in SAP GUI for Windows
CVE-2025-00545.4 MEDIUMCross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server Java
CVE-2025-252415.4 MEDIUMMissing Authorization check in SAP Fiori Apps Reference Library (My Overtime Requests)
CVE-2025-231875.3 MEDIUMMissing Authorization Check in SAP NetWeaver and ABAP Platform (SDCCN)
CVE-2025-231935.3 MEDIUMInformation Disclosure vulnerability in SAP NetWeaver Application Server ABAP
CVE-2025-231894.3 MEDIUMMissing Authorization Check in SAP NetWeaver and ABAP Platform (SDCCN)
CVE-2025-231904.3 MEDIUMMissing Authorization check in SAP NetWeaver and ABAP platform (ST-PI)
CVE-2025-248694.3 MEDIUMInformation Disclosure vulnerability in SAP NetWeaver Application Server Java
CVE-2025-248724.3 MEDIUMMissing Authorization check in SAP ABAP Platform (ABAP Build Framework)
CVE-2025-231913.1 LOWCache Poisoning through header manipulation vulnerability in SAP Fiori for SAP ERP

IV. Related Vulnerabilities

V. Comments for CVE-2025-25243

No comments yet


Leave a comment