CVE Alert: CVE-2025-42933 – SAP_SE – SAP Business One (SLD)

CVE-2025-42933

HIGHNo exploitation known

When a user logs in via SAP Business One native client, the SLD backend service fails to enforce proper encryption of certain APIs. This leads to exposure of sensitive credentials within http response body. As a result, it has a high impact on the confidentiality, integrity, and availability of the application.

CVSS v3.1 (8.8)
AV NETWORK · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
SAP_SE
Product
SAP Business One (SLD)
Versions
B1_ON_HANA 10.0 | SAP-M-BO 10.0
CWE
CWE-522, CWE-522: Insufficiently Protected Credentials
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-09T02:11:26.232Z
Updated
2025-09-09T02:11:26.232Z

AI Summary Analysis

Risk verdict

High risk: network-accessible backend API responses can disclose credentials, with high impact across confidentiality, integrity and availability; remediation should be prioritised even without confirmed exploitation.

Why this matters

Exposure of credentials in plaintext HTTP responses enables initial access and potential lateral movement if attackers harvest them at scale. The combination of network access, low privileges required and no user interaction lowers the barrier for exploitation, increasing the likelihood of a targeted data breach or credential stuffing-style abuse.

Most likely attack path

An external or internal attacker can reach the backend over the network, no user interaction required, and with only low privileges. A misconfigured encryption enforcement allows sensitive data to be returned in plaintext within API responses, enabling credential exposure without elevated access or exploits beyond the API. The broad scope remains unchanged, so resulting access may remain within the target application context.

Who is most exposed

Organizations running on-premises or hybrid deployments with the SLD backend exposed to client machines or partner networks are most at risk, particularly those relying on native clients for authentication and API access.

Detection ideas

  • Alerts for plaintext credentials appearing in HTTP response bodies from the backend.
  • Unusual, repetitive API responses containing sensitive fields (tokens, passwords, secrets).
  • Network IDS/IPS rules flagging large outbound payloads containing credentials.
  • WAF logs showing successful requests to sensitive endpoints with anomalous headers.
  • Audit trails showing access from non-admin accounts to credential-related APIs.

Mitigation and prioritisation

  • Apply available patches or upgrades that enforce proper API encryption; verify patch applicability to affected versions.
  • If patching isn’t possible, implement compensating controls: segment network access to the backend, restrict to trusted hosts, enforce TLS in transit, and rotate credentials exposed by APIs.
  • Enable strict access controls and least-privilege for clients contacting the backend; monitor and alert on credential exposure events.
  • Change-management: test fixes in staging, plan phased rollout, update incident response playbooks.
  • If KEV true or EPSS ≥ 0.5, treat as priority 1. Unknown KEV/EPSS; proceed with urgency but confirm values to reclassify accordingly.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.