PT-2025-17845 · Sap · Sap Netweaver Visual Composer
Benjamin Harris
·
Published
2025-04-22
·
Updated
2025-09-15
·
CVE-2025-31324
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
SAP NetWeaver (affected versions not specified)
**Description:**
SAP NetWeaver is affected by a critical vulnerability (CVE-2025-31324) allowing unauthenticated remote code execution (RCE) due to a missing authorization check in the Visual Composer Metadata Uploader. Attackers can upload malicious files, including JSP webshells and Golang-based malware (like Auto-Color), leading to full system compromise. The vulnerability has been actively exploited by multiple China-linked APT groups and ransomware actors, including Qilin and Scattered Lapsus$ Hunters, impacting over 581 critical systems worldwide across sectors like energy, government, healthcare, finance, and manufacturing. Exploitation involves uploading malicious payloads via the `/developmentserver/metadatauploader` endpoint. A proof-of-concept exploit is publicly available.
Over 1,200 systems are estimated to be vulnerable. The vulnerability has a CVSS score of 10.0.
**Recommendations:**
* Apply the SAP Security Note 3594142 immediately.
* If patching is not immediately possible, restrict access to the `/developmentserver/metadatauploader` endpoint.
* If Visual Composer is not in use, disable it completely.
* Configure SIEM to monitor for suspicious activity and unauthorized file uploads to the `/developmentserver/metadatauploader` endpoint.
* Implement intrusion detection and prevention systems (IDS/IPS) to detect and block exploitation attempts.
* Utilize threat intelligence feeds and tools to identify indicators of compromise (IOCs) associated with this vulnerability.
* Consider using the Nuclei template for detection.
* Ensure systems are updated with the latest security patches.
Exploit
Fix
RCE
Deserialization of Untrusted Data
Unrestricted File Upload
Related Identifiers
Affected Products
References · 681
- 🔥 https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment⭐ 6 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-31324 · Security Note
- https://url.sap/sapsecuritypatchday · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2025-31324 · Security Note
- https://bdu.fstec.ru/vul/2025-04927 · Security Note
- https://me.sap.com/notes/3594142 · Security Note
- https://bdu.fstec.ru/vul/2025-05676 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/720264 · Security Note
- https://github.com/ehang-io/nps⭐ 32394 🔗 5844 · Note
- https://github.com/tdragon6/Supershell⭐ 1578 🔗 197 · Note
- https://github.com/vxCrypt0r/Voidmaw⭐ 310 🔗 58 · Note
- https://github.com/ShadowMccc/MemoryEvasion⭐ 100 🔗 11 · Note
- https://github.com/TophantTechnology/ARL-doc⭐ 24 🔗 23 · Note
- https://twitter.com/onapsis/status/1928559577303224458 · Twitter Post
- https://twitter.com/IT_news_for_all/status/1922711738996199605 · Twitter Post