PT-2025-17845 · Sap · Sap Netweaver Visual Composer
Benjamin Harris
·
Published
2025-04-22
·
Updated
2025-07-17
·
CVE-2025-31324
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
## Vulnerability Summary
**Name of the Vulnerable Software and Affected Versions:** SAP NetWeaver versions 7.50 and earlier
**Description:**
SAP NetWeaver is vulnerable to a critical, remotely exploitable vulnerability (CVE-2025-31324) stemming from a missing authorization check in the Visual Composer Metadata Uploader. This flaw allows unauthenticated attackers to upload malicious files, potentially leading to remote code execution and full system compromise. Numerous threat actors, including China-linked APT groups (Chaya 004, CL-STA-0048, and others) and ransomware operations (Qilin, RansomExx), are actively exploiting this vulnerability in the wild. Attackers have been observed deploying webshells and tools like Brute Ratel and Heaven’s Gate. Over 1,200 systems have been compromised, with targets spanning various sectors including energy, government, healthcare, finance, and manufacturing. The vulnerability has a CVSS score of 10.0, indicating its critical severity.
**Recommendations:**
* Apply SAP Security Note 3594142 immediately to patch the vulnerability.
* If patching is not immediately possible, restrict access to the `/developmentserver/metadatauploader` endpoint.
* If Visual Composer is not in use, disable it entirely.
* Configure logging to monitor the servlet path for unauthorized file uploads.
* Utilize threat detection tools and resources (e.g., Nuclei templates) to identify potential exploitation attempts.
* Implement network monitoring and intrusion detection systems to identify and block malicious activity.
Fix
RCE
Deserialization of Untrusted Data
Unrestricted File Upload
Related Identifiers
Affected Products
References · 588
- https://bdu.fstec.ru/vul/2025-05676 · Security Note
- https://cve.org/CVERecord?id=CVE-2025-31324 · Security Note
- https://bdu.fstec.ru/vul/2025-04927 · Security Note
- https://url.sap/sapsecuritypatchday · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/720264 · Security Note
- https://me.sap.com/notes/3594142 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-31324 · Security Note
- https://github.com/ehang-io/nps⭐ 32394 🔗 5844 · Note
- https://github.com/tdragon6/Supershell⭐ 1578 🔗 197 · Note
- https://github.com/vxCrypt0r/Voidmaw⭐ 310 🔗 58 · Note
- https://github.com/ShadowMccc/MemoryEvasion⭐ 100 🔗 11 · Note
- https://github.com/TophantTechnology/ARL-doc⭐ 24 🔗 23 · Note
- https://twitter.com/That_isChina/status/1922580615716622686 · Twitter Post
- https://twitter.com/Unit42_Intel/status/1925642090010075173 · Twitter Post
- https://t.me/c/1519182536/18154 · Telegram Post