Advisory
On 23.09.2025 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within BI/BO platform.
SAP Note 3540622 addresses "[CVE-2025-42907] Server-Side Request Forgery in SAP BI Platform" to prevent server-side request forgery (ssrf) with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP BI Platform allows an attacker to modify the IP address parameter in the LogonToken of OpenDocument URLs, causing the application to send a ping to an unintended server when a victim clicks the link.Solution
With this fix, sending ping requests is restricted to the BOE network.
Affected System
SAP BusinessObjects Business Intelligence suite is an analytics platform allowing SAP customers to make better decisions based on their business data. SAP BI is a module meant for producing business insights and expands its power in combination with HANA DB and also exists as BW/4 HANA. Due to processing sensitive business data, the Data security is of utmost importance.
The advisory is valid for
- 6.5 [CVE-2023-42477] Server-Side Request Forgery in SAP NetWeaver AS Java (GRMG Heartbeat application)
- 5.3 [CVE-2024-27898] Server-Side Request Forgery in SAP NetWeaver (tc~esi~esp~grmg~wshealthcheck~ear)
- 5.0 [CVE-2024-34689] Prerequisite for Security Note 3458789
- 5.0 [CVE-2024-34689] Allowlisting of callback-URLs in SAP Business Workflow (WebFlow Services)
- 5.0 [CVE-2024-34689] Server-Side Request Forgery in SAP Business Workflow (WebFlow Services)
