Skip to content

SAP Urges Swift Action: 15 New Advisories Address Critical Code Injection Vulnerabilities

SAP's latest patch cycle fixes three critical code injection flaws. Companies must prioritize patching to protect their systems.

In this image we can see a bug on the leaf.
In this image we can see a bug on the leaf.

SAP Urges Swift Action: 15 New Advisories Address Critical Code Injection Vulnerabilities

SAP has released a significant security update, publishing 15 new advisories and updating 4 existing ones on August 12, 2025. The company urges swift action from security teams to implement these patches due to the critical nature of the vulnerabilities addressed.

The patch cycle fixed three critical code injection vulnerabilities, affecting core SAP products. These allow attackers to execute arbitrary code with elevated privileges. Companies are advised to prioritize patching internet-facing systems and those processing sensitive data.

The critical vulnerabilities include CVE-2025-42957 and CVE-2025-42950, affecting SAP S/4HANA and SAP Landscape Transformation respectively. SAP strongly recommends obtaining the patches via the Support Portal, with a focus on the three critical code injection security gaps.

The patch cycle also addressed cross-site scripting vulnerabilities (XSS), authorization bypass issues, and information disclosure vulnerabilities in several SAP products. Notable updates include patches for SAP GUI for Windows and the SAP Cloud Connector. These vulnerabilities can be exploited with low effort and without user interaction, making them attractive targets for cybercriminals.

The security notifications addressing vulnerabilities in SAP products were published in September 2025, linked to the SAP Patchday in September 2025 which fixed more than twenty vulnerabilities. Among the updated patches is CVE-2025-27429, a previously known code injection vulnerability in S/4HANA. Companies are advised to coordinate with SAP administrators and prioritize these urgent security updates to protect their systems.

Read also:

Latest