Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

SAP Issues Urgent Fixes for April 2025 Vulnerabilities

SAP Issues Urgent Fixes for April 2025 Vulnerabilities SAP Issues Urgent Fixes for April 2025 Vulnerabilities
IMAGE CREDITS: SECURITY MAGAZINE

SAP has issued vital security updates this April, addressing multiple high-risk vulnerabilities across its enterprise platforms. Among the 20 notes released on Patch Day—18 new and two updates—three stand out for their critical severity, including code injection flaws and an authentication bypass threat.

Critical Code Injection Bugs in S/4HANA and Analysis Platform

Two of the most serious issues, listed under CVE-2025-27429 and CVE-2025-31330 with CVSS scores of 9.9, are code injection flaws affecting SAP S/4HANA (Private Cloud) and the Landscape Transformation Analysis Platform.

Interestingly, security experts at Onapsis say both CVEs refer to the same underlying issue. The patches released by SAP disable a remote-enabled function module vulnerable to exploitation in both platforms.

According to Onapsis, the flaw allows attackers to inject any text input, which is then used to generate an ABAP report via the INSERT REPORT command. This can be exploited with just S_RFC authorization on the function module or its function group—making it a major risk if left unpatched.

Authentication Bypass Risk in SAP Financial Consolidation

The third critical vulnerability, tracked as CVE-2025-30016 (CVSS 9.8), impacts SAP Financial Consolidation. This bug allows an attacker to bypass authentication and impersonate an administrator without needing credentials.

Such a flaw could give cybercriminals full access to sensitive financial systems, making this a top-priority fix for SAP customers relying on Financial Consolidation tools.

High-Severity Vulnerabilities Also Addressed

SAP didn’t stop at critical issues. Five high-severity vulnerabilities were also resolved. One update fixes an improper authorization bug in the BusinessObjects Business Intelligence platform.

Other high-risk flaws include bugs in:

  • NetWeaver Application Server ABAP
  • Commerce Cloud
  • Capital Yield Tax Management

The Commerce Cloud bug, involving a race condition in Apache Tomcat, is only exploitable under very specific conditions that aren’t enabled by default—reducing its immediate impact but still requiring a patch.

Medium and Low-Risk Bugs Fixed Across Platforms

In addition to the critical and high-risk patches, SAP also addressed:

  • 10 medium-severity flaws
  • 1 low-severity issue

These affected multiple components including:

  • ERP BW Business Content
  • BusinessObjects
  • KMC WPC
  • NetWeaver
  • Solution Manager
  • S4CORE entity
  • S/4HANA
  • Commerce Cloud

No Exploits Yet—But Patching Is Urgent

So far, SAP hasn’t reported any active exploitation of these vulnerabilities. However, given the critical nature of some flaws—especially those enabling admin impersonation and remote code injection—businesses are strongly urged to install the patches immediately.

Cybersecurity professionals warn that delays in patching can create openings for threat actors, particularly in high-value environments like enterprise resource planning (ERP) systems.

Share with others