Contact US
Blog

CVE-2025-31324 in SAP NetWeaver: Critical RCE and Server Hijacking Alert

SAP NetWeaver vulnerability CVE-2025-31324 recently received the highest CVSS score of 10.0. This unrestricted file upload flaw can be exploited to hijack servers and perform remote code execution, with large-scale abuse already reported across multiple industries. This blog outlines the security risks of CVE-2025-31324 and introduces mitigation strategies based on Cyber Threat Intelligence (CTI). CVE-2025-31324: […]

SAP NetWeaver vulnerability CVE-2025-31324 recently received the highest CVSS score of 10.0. This unrestricted file upload flaw can be exploited to hijack servers and perform remote code execution, with large-scale abuse already reported across multiple industries. This blog outlines the security risks of CVE-2025-31324 and introduces mitigation strategies based on Cyber Threat Intelligence (CTI).

CVE-2025-31324: A Critical Vulnerability in SAP NetWeaver

CVE-2025-31324 is a critical vulnerability in SAP NetWeaver that allows unauthenticated attackers to execute arbitrary code on exposed instances, potentially leading to full system compromise. It primarily affects VCFRAMEWORK 7.X versions with Visual Composer enabled and without security patches. Due to the risk of remote code execution (RCE) and possible malware injection into the host system, the vulnerability has received a CVSS score of 10.0.

Through specially crafted POST requests, attackers can upload malicious files like JSP web shells and execute arbitrary system commands. Several global companies have already reported incidents of exploitation. Although SAP released a patch on May13, many servers remain exposed and vulnerable to CVE-2025-31324. Organizations should promptly verify the version and security status of their SAP NetWeaver systems and take immediate action.

CTI-Based Detection of SAP NetWeaver Vulnerability Exposure

Criminal IP can help detect SAP NetWeaver systems affected by CVE-2025-31324 or related vulnerabilities. For example, the following query locates publicly accessible SAP NetWeaver Application Servers.

Criminal IP Search Query: product: sap netweaver application server

A search results for 'product: sap netweaver application server' on Criminal IP Asset Search
A search results for ‘product: sap netweaver application server’ on Criminal IP Asset Search

A scan using Criminal IP revealed that 2,955 SAP NetWeaver servers were exposed to the internet. Among the results, some servers returned HTTP status codes 200 and 401. SAP NetWeaver is typically used for core enterprise systems such as HR, finance, and supply chain.
When properly secured, sensitive or internal-only URLs should return one of the following responses:

  • 401 Unauthorized: Authentication required
  • 403 Forbidden: Access denied
  • 404 Not Found: Path hidden

A 200 status code indicates that the endpoint is accessible without authentication and may accept uploads. In particular, one of the results revealed that port 50000, a default SAP NetWeaver port, was open, and the system was running version 7.53, which is vulnerable to CVE-2025-31324. If SAP Visual Composer is enabled under these conditions, the server is vulnerable to exploitation via CVE-2025-31324.

Detection of open ports on SAP NetWeaver servers returning a 200 status code
Detection of open ports on SAP NetWeaver servers returning a 200 status code

The server was identified as having an unpatched vulnerability that has existed since 2017 and remains a likely target for active exploitation. Immediate security measures are recommended. Its external exposure presents a significant risk of authentication bypass, remote code execution, information leakage, and privilege escalation.

Preventing Exploitation of CVE-2025-31324

CVE-2025-31324 is a critical vulnerability that allows an attacker to bypass authentication, upload malicious JSP files, and execute remote code. To prevent the exploitation of this vulnerability, a multi-layered security response strategy is required, incorporating not only technical patches but also Threat Intelligence (CTI) and Attack Surface Management (ASM).

  • Apply the official SAP security patches and disable Visual Composer if unnecessary.
  • Block unauthorized POST requests via SAP Web Dispatcher or a Web Application Firewall (WAF).
  • Use Threat Intelligence tools to detect and respond to vulnerabilities.
  • Monitor external exposure of servers using Attack Surface Management solutions.

FAQ

Q1.What impact does the exploitation of CVE-2025-31324 have?

If CVE-2025-31324 is exploited, an attacker can upload and execute a malicious JSP file on the SAP NetWeaver Application Server without authentication, allowing remote control over the server. This may lead to the following security impacts.

  1. Remote Code Execution: Attackers can execute system commands on the server, enabling malware execution and full server compromise.
  2. Backdoor and Web Shell Installation: The uploaded JSP file can act as a web shell, maintaining unauthorized access for future intrusions.
  3. Data Breach and Internal Information Exposure: Compromise of critical SAP data, including customer, operational, and employee-related information.
  4. Lateral Movement within Internal Network: The SAP server is used as a base for lateral movement inside the network.
  5. Service Disruption and Operational Impact: Resource drain or system alteration can disrupt operations.
  6. Regulatory violations and reputational damage: Data leaks may result in legal penalties under GDPR, CCPA, and diminished trust from customers, partners, and auditors.

Q2. How can the exploitation of CVE-2025-31324 be prevented?

CVE-2025-31324 is a severe vulnerability that may result in remote code execution and full server compromise. To mitigate this risk, it is essential to implement a comprehensive security framework that includes not only the latest patches but also Cyber Threat Intelligence (CTI) and Attack Surface Management (ASM). SAP recommends applying the latest security patches, disabling the Visual Composer if unnecessary, and configuring defenses against unauthenticated POST requests.  Additionally, leveraging CTI tools can help detect and respond to vulnerable conditions early, while ASM solutions enable continuous monitoring of external exposures to proactively prevent security incidents.

Conclusion

SAP NetWeaver is a critical infrastructure for an organization’s core operations. Its security vulnerabilities extend beyond system flaws and can lead to significant business risks. CVE-2025-31324 is a severe vulnerability that allows authentication bypass, file uploads, and remote code execution, with real-world exploitation cases already reported. Applying patches alone is not enough. A multi-layered defense strategy that leverages CTI and ASM to continuously monitor for external exposure and proactively detect attack indicators is essential.

In relation to this, you can refer to CVE-2025-32433: Critical RCE Vulnerability in Erlang/OTP SSH.


Source: Criminal IP (https://www.criminalip.io), NIST (https://nvd.nist.gov/vuln/detail/CVE-2025-31324), Bleeping Computer (https://www.bleepingcomputer.com/news/security/over-1-200-sap-netweaver-servers-vulnerable-to-actively-exploited-flaw/), SC Media (https://www.scworld.com/news/sap-netweaver-bug-exploited-since-january-allows-rce)

Related article :

https://www.criminalip.io/knowledge-hub/blog/27659

CVE-2025-31324 in SAP NetWeaver: Critical RCE and Server Hijacking Alert | CIP Blog | Criminal IP