Warning: this SAP NetWeaver bug has a maximum severity score and could subsequently target your servers.


  • SAP fixed CVE-2025-42944, a critical flaw allowing execution of unauthenticated operating system commands
  • Two more serious vulnerabilities affect the SAP Print Service and Supplier Relationship Management modules
  • Unpatched systems remain exposed; n-day vulnerabilities are widely exploited due to delay in patching

Software giant SAP has released an additional security hardening for a maximum severity vulnerability that grants malicious actors arbitrary command execution capabilities on compromised endpoints.

Earlier this week, the company released a new security advisory, detailing fixes for a total of 17 vulnerabilities (13 fixes and 4 updates), including a 10/10 flaw “unsafe deserialization in SAP NetWeaver AS Java.” Tracked as CVE-2025-42944, the flaw allowed malicious actors to exploit systems via the RMI-P4 module by submitting malicious payloads to an open port.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top