Flash Notices

Flash Notice: SAP NetWeaver Visual Composer Remote Code Execution Vulnerability

Written by Marketing | May 8, 2025 4:36:15 PM

overview

CVE-2025-31324 is a critical vulnerability affecting the SAP NetWeaver Visual Composer's Metadata Uploader component, which lacks proper authorization controls. This flaw allows unauthenticated attackers to upload malicious executable files to the system, ultimately enabling remote code execution with the same privileges as the SAP application. With a maximum CVSS score of 10.0 and an EPSS rating of 0.78, this vulnerability poses an extreme risk, as successful exploitation gives adversaries the ability to deploy webshells, execute arbitrary commands, and establish persistent access to business-critical SAP servers used across various industries.

AFFECTED PRODUCTS AND VERSIONS

  • Impacted Software: SAP NetWeaver Visual Composer
  • Vulnerable Component: Metadata Uploader in Visual Composer
  • Vulnerable Version: VCFRAMEWORK version 7.50
  • Patched Version: Emergency security update released April 24, 2025

CURRENT THREAT STATUS

Multiple security organizations, including ReliaQuest, Watchtower, Microsoft, Rapid7, and Picus Security, have confirmed that CVE-2025-31324 is being actively exploited in the wild as of late April 2025. Attackers are using the vulnerability to upload executable files through the Metadata Uploader, deploy webshells for persistent access, and execute commands with the SAP server's privileges. The attack chain aligns with Initial Access (TA0001) and Exploit Public-Facing Application (T1190) tactics within the MITRE ATT&CK framework.

Immediate Action Required:
Organizations are strongly advised to apply the emergency SAP patch without delay and proactively hunt for backdoors or command-and-control beacons that might have been established prior to patching.

 

 

INDICATORS OF COMPROMISE (IOCS)

As of April 30, 2025, only the following Indicators of Compromise (IoCs) have been publicly disclosed relating to the active exploitation of CVE-2025-31324. While exploitation is confirmed, technical indicators such as file hashes, attacker IP addresses, or signatures have not yet been made available by security vendors or threat intelligence providers.

 

EXPOSURE AND ATTACK PATH

The vulnerability affects the UDDI (Universal Description, Discovery, and Integration) service, typically exposed at:

https://<hostname>:<port>/uddi/UDDISOAPService

This service processes SOAP/XML messages and fails to enforce authentication for sensitive operations.


SUGGESTED MONITORING STRATEGIES

Until specific IoCs are released, organizations should monitor for:

  • Unauthorized access attempts to UDDI service endpoints
  • Unexpected file uploads via the Metadata Uploader
  • Unusual activity from <sid>adm accounts (compromises grant this access)
  • Suspicious outbound or inbound network connections from SAP infrastructure
  • Unexpected Web-Executable Files: Presence of unknown or suspicious web-executable files in known exploit paths.
  • Unauthorized Access: Unusual access patterns or unauthorized access to SAP sensitive business data and processes.

NEXT STEPS

Avertium continues to monitor for IOCs and will disclose them as soon as possible once identified. In the meantime, patching remains the top priority. Organizations unable to patch immediately should apply all available mitigations and conduct compromise assessments if exposure is suspected.

For enhanced protection against CVE-2025-31324, Avertium's Threat Detection & Response (TDR) services can assist with real-time monitoring, incident detection, and response.

 

 

MITRE ATT&CK ttPS

 

Tactic

Technique Name

Technique ID

How It Applies

Initial Access

Exploit Public-Facing Application

T1190

Uploads malicious executables via unauthenticated access to Metadata Uploader

Execution

Command and Scripting Interpreter

T1059

Executes arbitrary code using interpreters after upload

Execution

Exploitation for Client Execution

T1203

Triggers the uploaded payload for remote code execution

Persistence

Server Software Component

T1505

Installs webshells or backdoors in SAP components

Persistence

Event Triggered Execution

T1546

Configures payloads to execute on app events/triggers

Privilege Escalation

Exploitation for Privilege Escalation

T1068

Escalates privilege using initial exploit paths

Defense Evasion

Masquerading

T1036

Disguises payloads as legitimate files or components

Defense Evasion

Hide Artifacts

T1564

Hides or obfuscates binaries/scripts in SAP directories

Impact

Data Destruction

T1485

Deletes or corrupts critical data using code execution

Impact

Endpoint Denial of Service

T1499

Renders SAP or hosts inoperable via crafted payloads

 

 

Summary of Techniques: Adversaries gain access by exploiting the Metadata Uploader with insufficient authorization controls (T1190). - Uploaded malicious binaries allow for remote code execution (T1059, T1203). - Persistence established through webshells/backdoors (T1505, T1546). - Privilege escalation possible if the SAP application runs with elevated permissions (T1068). - Defense evasion via masquerading and artifact hiding (T1036, T1564). - Impact ranges from data destruction to full endpoint denial of service (T1485, T1499).

 

 

additional Recommendations + information

CVE-2025-30391 carries a CVSS rating of 8.1, underscoring its significant risk. Organizations are urged to take the following mitigation and defense steps:

IMMEDIATE MITIGATION MEASURES

  • Apply SAP's emergency patch (SAP Security Note #3594142) for NetWeaver AS Java versions 7.50, 7.51, and 7.52. For those unable to patch, implement mitigations from SAP Note #3593336.
  • Restrict all external access to /uddi/ and related URLs via firewall and SAP Web Dispatcher rules. Permit internal access only for trusted administration.
  • Disable the UDDI service if not business-critical.
  • Enforce strict authentication (HTTP Basic Auth, SAML) for all external-facing SAP web services.
  • Remove or disable unnecessary Visual Composer services, running them only if essential.

PATCH AND SYSTEM MONITORING

  • Confirm patch deployment across all NetWeaver systems.
  • For legacy or unsupported environments, rigorously implement workaround mitigations.
  • Regularly monitor SAP Patch Day advisories for further updates. - Deploy logs and endpoint monitoring for:
    • Unauthorized access to /uddi/
    • Unusual uploads or executable creation in SAP web directories
    • Anomalous privilege escalation or process launches after uploads.
  • Use SIEM, endpoint detection, and XDR for real-time alerting. Restrict risky port exposure (e.g., 80, 443, 50000, 8080).

NETWORK SECURITY

  • Block known malicious IPs and threat sources at the perimeter using threat intelligence and firewall rules.
  • Restrict unnecessary network access, especially to SAP NetWeaver from untrusted networks.
  • Isolate unpatched or vulnerable SAP systems within dedicated network segments or VLANs; limit management to secure admin networks.
  • Deploy IDS/IPS to monitor exploit attempts (e.g., anomalous POST requests or large binary uploads).
  • Conduct regular vulnerability scans and penetration testing in SAP environments.

 

 

ADDITIONAL SERVICE OFFERINGS

CVE-2025-31324's criticality demands a coordinated approach covering detection, remediation, and continuous monitoring. Avertium provides several services relevant to managing this risk:

Attack Surface Management (ASM) - Identifies and mitigates vulnerabilities, with targeted focus on SAP Visual Composer exposure. - Provides acceleration services for rapid remediation, testing, and simulation of attacker TTPs to validate controls.

Threat Detection & Response (TDR) - Delivers XDR-informed monitoring, integrating SIEM and endpoint security to identify exploits, unusual uploads, and anomalous behaviors in SAP environments. - Offers strategic threat coverage for SAP and other critical applications.

Microsoft Security Solutions - Tailored for organizations running SAP in Microsoft environments, combining detection rules specific to SAP threats and managed endpoint security to detect lateral movement and reduce attack surface.

Governance, Risk, and Compliance (GRC) - Assists with compliance mandates (e.g., SEC, NIS2, SOX, NERC) by conducting audits, aligning security practices, and managing risk within SAP operations.

RECOMMENDED APPROACH

  • Immediate Assessment: Use ASM to discover and assess vulnerable SAP Visual Composer instances.
  • Continuous Monitoring: Implement TDR for real-time detection and response to exploitation attempts.
  • Comprehensive Protection: Leverage Microsoft Security Solutions for SAP deployments on Microsoft infrastructure.
  • Regulatory Compliance: Engage GRC services to ensure organizational compliance as you remediate the vulnerability.

This multi-layered strategy addresses not only the technical aspects of CVE-2025-31324 but also the business and regulatory risks associated with its exploitation.


 

 

SUPPORTING DOCUMENTATION