CVE-2025-42967 Overview
CVE-2025-42967 is a critical remote code execution (RCE) vulnerability affecting SAP S/4HANA and SAP SCM Characteristic Propagation. This code injection flaw (CWE-94) allows an attacker with user-level privileges to create a new report containing malicious code, potentially gaining full control of the affected SAP system. Successful exploitation results in high impact on confidentiality, integrity, and availability of the application, making this a significant threat to enterprise SAP environments.
Critical Impact
Attackers with basic user privileges can execute arbitrary code on vulnerable SAP systems, potentially compromising the entire SAP landscape including sensitive business data, financial records, and critical business processes.
Affected Products
- SAP S/4HANA (Characteristic Propagation component)
- SAP SCM (Supply Chain Management - Characteristic Propagation component)
Discovery Timeline
- 2025-07-08 - CVE-2025-42967 published to NVD
- 2025-07-08 - Last updated in NVD database
Technical Details for CVE-2025-42967
Vulnerability Analysis
This vulnerability stems from improper code injection controls in the Characteristic Propagation functionality within SAP S/4HANA and SAP SCM. The flaw enables authenticated users to inject and execute arbitrary code through the report creation mechanism. The vulnerability is particularly dangerous because it requires only standard user-level access to exploit, yet can result in complete system compromise.
The network-accessible nature of this vulnerability, combined with the low attack complexity and no required user interaction, makes it highly exploitable in real-world scenarios. The scope-changing nature of this vulnerability indicates that exploitation can impact resources beyond the vulnerable component itself, potentially affecting other connected SAP systems.
Root Cause
The root cause is a code injection vulnerability (CWE-94) in the Characteristic Propagation component. The application fails to properly validate and sanitize user-supplied input when creating reports. This allows attackers to inject malicious code that is subsequently executed by the SAP system with elevated privileges, bypassing the normal security boundaries expected from user-level access.
Attack Vector
The attack is conducted over the network and requires an attacker to have valid user credentials with basic privileges on the target SAP system. The attacker leverages the report creation functionality within the Characteristic Propagation component to inject malicious ABAP code or other executable content.
The exploitation flow involves:
- Authenticating to the SAP system with standard user credentials
- Accessing the Characteristic Propagation report creation feature
- Injecting malicious code within the report definition
- Triggering execution of the malicious code
- Gaining elevated access or full control over the SAP system
Due to the sensitive nature of this vulnerability and the lack of verified public exploit code, technical details are limited to this prose description. For specific technical implementation details, refer to SAP Note #3618955.
Detection Methods for CVE-2025-42967
Indicators of Compromise
- Unusual report creation activity in the Characteristic Propagation module by low-privileged users
- Unexpected ABAP code execution or new custom programs appearing in the system
- Anomalous system calls or process spawning from SAP application servers
- Suspicious authentication patterns followed by privileged operations
Detection Strategies
- Monitor SAP Security Audit Log (SM21) for unusual report creation and execution events
- Implement SIEM rules to detect abnormal access patterns to Characteristic Propagation functionality
- Review SAP system logs for unauthorized code execution or privilege escalation attempts
- Enable enhanced logging for the affected SAP S/4HANA and SCM components
Monitoring Recommendations
- Configure real-time alerts for new report creation in sensitive SAP modules
- Establish baseline user behavior patterns and alert on deviations
- Monitor network traffic for unusual data exfiltration patterns from SAP servers
- Implement periodic security scans using SAP Solution Manager or third-party security tools
How to Mitigate CVE-2025-42967
Immediate Actions Required
- Apply the security patch referenced in SAP Note #3618955 immediately
- Review and restrict user access to the Characteristic Propagation report creation functionality
- Audit existing reports in the affected modules for any signs of code injection
- Implement additional access controls and segregation of duties for affected components
Patch Information
SAP has released a security patch to address this vulnerability. Organizations should download and apply the fix documented in SAP Note #3618955. This vulnerability was addressed as part of the SAP Security Patch Day release cycle. Due to the critical severity of this vulnerability, immediate patching is strongly recommended.
Workarounds
- Temporarily restrict access to the Characteristic Propagation functionality until patches can be applied
- Implement network-level access controls to limit connectivity to SAP systems from untrusted networks
- Enable enhanced authorization checks for report creation and modification activities
- Consider implementing SAP Code Vulnerability Analyzer (CVA) to scan custom code for injection vulnerabilities
# SAP authorization object restriction example
# Restrict SE38 and SE80 transactions for non-development users
# Review and limit S_DEVELOP authorization object assignments
# Implement SU53 authorization trace for failed access attempts monitoring
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


