Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3634724
was released on
14.10.2025 and deals with
"[CVE-2025-42906] Directory Traversal vulnerability in SAP Commerce Cloud" within SAP Commerce Cloud.
We advice you to follow the instructions, to resolve
directory traversal
with a
medium potential for exploitation
in component CEC-SCC-PLA-PL.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP Commerce Cloud allows an authenticated attacker to access web applications, such as the Administration Console, from locations where the console is not explicitly deployed, resulting in a bypass of configured access restrictions.Solution
The vulnerability can be addressed by deploying the Administration Console on a separate virtual host in Tomcat.
- 9.8 [CVE-2025-42937] Directory Traversal vulnerability in SAP Print Service
- 9.6 [CVE-2023-27500] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 9.6 [CVE-2023-27269] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 8.7 [CVE-2022-41214] Multiple vulnerabilities in SAP NetWeaver Application Server ABAP and ABAP Platform
- 8.7 [CVE-2023-27501] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
