Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-31324 PoC — Missing Authorization check in SAP NetWeaver (Visual Composer development server)

Source
Associated Vulnerability
Title:Missing Authorization check in SAP NetWeaver (Visual Composer development server) (CVE-2025-31324)
Description:SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
Description
sap-netweaver-cve-2025-31324-check
Readme
# SAP CVE-2025-31324 Check

## Overview
This template is designed to check the presence of the **SAP NetWeaver CVE-2025-31324** vulnerability. This vulnerability allows unauthorized users to upload JSP files through the `/developmentserver/metadatauploader` endpoint, which can lead to potential remote code execution.

## How to Run

### Prerequisites
- Ensure you have [Nuclei](https://github.com/projectdiscovery/nuclei) installed.
- Save the template file as `sap-netweaver-cve-2025-31324-check.yaml`.

### Basic Usage
```bash
nuclei -t sap-netweaver-cve-2025-31324-check.yaml -u https://target-url.com

File Snapshot

[4.0K] /data/pocs/45f836325630011a12eed08057efb0e0aa713fed ├── [ 608] README.md └── [ 12K] sap-netweaver-cve-2025-31324-check.yaml 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →