Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks

More than 400 SAP NetWeaver servers are impacted by CVE-2025-31324, an exploited remote code execution vulnerability.

SAP vulnerabilities

More than 400 SAP NetWeaver instances are exposed to attacks targeting a zero-day vulnerability patched last week, the nonprofit cybersecurity organization The Shadowserver Foundation warns.

The exploited issue, tracked as CVE-2025-31324 (CVSS score of 10/10) and described as a missing authorization check, impacts the Visual Composer Metadata Uploader component of NetWeaver, and allows attackers to upload malicious executables.

On April 24, SAP released security note 3594142 that addresses the flaw, and updated its April 2025 Security Patch Day advisory to add the note, urging customers to apply the patch as soon as possible.

Cybersecurity firm ReliaQuest, which uncovered the bug during an investigation into intrusions at multiple customers, observed threat actors exploiting CVE-2025-31324 to deploy JSP webshells in a root directory and then leveraging them for payload deployment, code execution, and lateral movement.

Shortly after the security defect was publicly disclosed, application security firm Onapsis told SecurityWeek it was seeing over 10,000 internet-facing SAP applications, but noted that the vulnerable Metadata Uploader component was not enabled by default, and that not all instances were impacted.

“The exploitation grants the attackers full control over SAP’s critical business processes and information, which could result in espionage, sabotage, and fraud,” Onapsis said.

Over the weekend, The Shadowserver Foundation warned that it was seeing over 450 SAP NetWeaver instances vulnerable to CVE-2025-31324.

As of April 28, 427 instances are still vulnerable, data from The Shadowserver Foundation shows. Most of these are in the US (132), followed by India (45), Australia (38), Germany (29), and China (26).

Advertisement. Scroll to continue reading.

Considering the vulnerability’s ongoing exploitation and the critical role SAP applications have within business environments, organizations are advised to apply the patches for CVE-2025-31324 as soon as possible.

Related: SAP Zero-Day Possibly Exploited by Initial Access Broker

Related: SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver

Related: Organizations Warned of Exploited SAP, Gpac and D-Link Vulnerabilities

Related: SAP AI Core Vulnerabilities Allowed Service Takeover, Customer Data Access

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.