Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3630595
was released on
14.10.2025 and deals with
"[CVE-2025-42937] Directory Traversal vulnerability in SAP Print Service" within SAPSprint.
We advice you to follow the instructions, to resolve
directory traversal
with a
hot news potential for exploitation
in component BC-CCM-PRN.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as monthly patch process.
Risk specification
SAP Print Service allows an unauthenticated attacker to manipulate file paths and overwrite system files outside the intended directory, potentially resulting in full system compromise.Solution
The validation of path inputs has been strengthened to prevent access to unauthorized directories and the overwriting of system-critical files.
The advisory is valid for
- SAPSPRINT 8.00
- SAPSPRINT 8.10
- 9.6 [CVE-2023-27500] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 9.6 [CVE-2023-27269] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 8.7 [CVE-2022-41214] Multiple vulnerabilities in SAP NetWeaver Application Server ABAP and ABAP Platform
- 8.7 [CVE-2023-27501] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 7.7 [CVE-2025-27428] Directory Traversal vulnerability in SAP NetWeaver and ABAP Platform (Service Data Collection)
