PT-2025-17845 · Sap · Sap Netweaver Visual Composer
Benjamin Harris
·
Published
2025-04-22
·
Updated
2026-02-26
·
CVE-2025-31324
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
SAP NetWeaver (affected versions not specified)
Description
SAP NetWeaver is affected by a critical vulnerability (CVE-2025-31324) allowing unauthenticated attackers to upload malicious files, potentially leading to remote code execution and full system compromise. This flaw resides in the Visual Composer Metadata Uploader, lacking proper authorization checks. Numerous threat actors, including China-linked APT groups and ransomware operations (Qilin, Scattered Lapsus$ Hunters), are actively exploiting this vulnerability. Exploitation has been observed globally, impacting critical infrastructure sectors like energy, government, and healthcare. Attackers are deploying webshells, malware (Auto-Color), and utilizing techniques like the deployment of Golang-based backdoors. The vulnerability has a CVSS score of 10.0, indicating its critical severity. Over 1,200 systems are reported to be vulnerable.
Recommendations
Apply the latest SAP security patch (Security Note 3594142) immediately. If patching is not immediately possible, restrict access to the /developmentserver/metadatauploader endpoint and disable Visual Composer if it is not in use. Implement robust monitoring and logging to detect suspicious activity. Utilize intrusion detection and prevention systems (IDS/IPS) to identify and block exploitation attempts. Regularly scan systems for vulnerabilities and ensure timely patching.
Fix
RCE
Unrestricted File Upload
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2025-04927
BDU:2025-05676
CVE-2025-31324
SAPNETWEAVERCVE2025_31324
Affected Products
Sap Netweaver Visual Composer
References · 711
- https://url.sap/sapsecuritypatchday · Vendor Advisory
- https://me.sap.com/notes/3594142 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-31324 · Security Note
- https://bdu.fstec.ru/vul/2025-05676 · Security Note
- https://bdu.fstec.ru/vul/2025-04927 · Security Note
- https://cve.org/CVERecord?id=CVE-2025-31324 · Security Note
- https://github.com/ehang-io/nps⭐ 32394 🔗 5844 · Note
- https://github.com/tdragon6/Supershell⭐ 1578 🔗 197 · Note
- https://github.com/vxCrypt0r/Voidmaw⭐ 310 🔗 58 · Note
- https://github.com/ShadowMccc/MemoryEvasion⭐ 100 🔗 11 · Note
- https://github.com/TophantTechnology/ARL-doc⭐ 24 🔗 23 · Note
- https://twitter.com/Strivehawk/status/1916971309818323012 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1mesjhb/top_10_trending_cves_01082025 · Reddit Post
- https://twitter.com/rapidriskradar/status/1917722591894331718 · Twitter Post
- https://twitter.com/catnap707/status/1928594168529457442 · Twitter Post