Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SAP June 2025 Patch Day

Posted on June 10, 2025June 10, 2025 By CWS

SAP launched its month-to-month Safety Patch Day replace addressing 14 vital vulnerabilities throughout a number of enterprise merchandise. 

The great safety replace consists of patches addressing vital authorization bypass points and cross-site scripting vulnerabilities, with CVSS scores starting from 3.0 to 9.6. 

Organizations utilizing SAP enterprise options are strongly suggested to prioritize the implementation of those safety patches to guard their business-critical landscapes from potential exploitation.

Important & Excessive-severity Vulnerabilities Patched

Probably the most extreme vulnerability addressed on this patch cycle is CVE-2025-42989, a lacking authorization test in SAP NetWeaver Software Server for ABAP. 

This vital flaw carries a most CVSS rating of 9.6 and impacts KERNEL variations 7.89, 7.93, 9.14, and 9.15. 

The vulnerability might probably enable unauthorized entry to delicate enterprise features, making speedy patching important for organizations working these kernel variations.

CVE-2025-42982 represents a high-priority data disclosure vulnerability in SAP GRC (AC Plugin) with a CVSS rating of 8.8. 

This safety flaw impacts GRCPINW variations V1100_700 and V1100_731, probably exposing delicate governance, threat, and compliance information to unauthorized customers.

Moreover, CVE-2025-42983 addresses a lacking authorization test in SAP Enterprise Warehouse and SAP Plug-In Foundation, scoring 8.5 on the CVSS scale and affecting a number of variations, together with PI_BASIS 2006_1_700 by 731, 740, and SAP_BW variations 750 by 915.

Medium Severity Vulnerabilities

A number of medium-priority vulnerabilities had been addressed, focusing totally on SAP S/4HANA purposes. 

CVE-2025-42993 addresses a lacking authorization test in SAP S/4HANA’s Enterprise Occasion Enablement performance, impacting SAP_GWFND variations 757 and 758, with a CVSS rating of 6.7. 

This vulnerability might probably enable unauthorized entry to enterprise occasion processing capabilities.

CVE-2025-31325 addresses a Cross-Web site Scripting vulnerability in SAP NetWeaver’s ABAP Key phrase Documentation, particularly impacting SAP_BASIS model 758 with a CVSS rating of 5.8. 

The patch additionally consists of fixes for CVE-2025-42984, which resolves authorization test points in SAP S/4HANA’s Handle Central Buy Contract utility affecting S4CORE variations 106, 107, and 108.

Extra medium-priority patches embody CVE-2025-42998 for safety misconfiguration in SAP Enterprise One Integration Framework and CVE-2025-42987 addressing authorization checks in SAP S/4HANA’s financial institution assertion processing guidelines performance.

Low Severity Vulnerabilities

CVE-2025-42988 addresses Server-Facet Request Forgery in SAP Enterprise Objects Enterprise Intelligence Platform, affecting ENTERPRISE variations 430, 2025, and 2027 with a CVSS rating of three.7. 

CVE-2025-42990 resolves HTML injection points in unprotected SAPUI5 purposes throughout a number of UI variations.

SAP strongly recommends that prospects go to the Help Portal instantly to obtain and apply these vital safety patches. 

Organizations ought to prioritize patches primarily based on their CVSS scores and the criticality of affected methods inside their enterprise panorama. 

Common monitoring of SAP Safety Patch Day releases stays important for sustaining sturdy cybersecurity postures in enterprise environments.

Reside Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:Day, June, Patch, SAP

Post navigation

Previous Post: Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises
Next Post: Vulnerabilities Exposed Phone Number of Any Google User

Related Posts

Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News
How to Use Threat Intelligence to Enhance Cybersecurity Operations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts
  • SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws
  • How to Use Mobile Device Management (MDM)
  • Microsoft Patches 86 Vulnerabilities – SecurityWeek
  • Adobe Patches Critical ColdFusion and Commerce Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts
  • SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws
  • How to Use Mobile Device Management (MDM)
  • Microsoft Patches 86 Vulnerabilities – SecurityWeek
  • Adobe Patches Critical ColdFusion and Commerce Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News