CVE-2025-30012
moderate-risk
Published 2025-05-13
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component, which allows an unauthenticated attacker to send malicious payload request in a specific encoding format. The servlet will then decode this malicious request which will result in deserialization of data in the application leading to execution of arbitrary OS command on target as SAP Administrator. This vulnerability has High impact on confidentiality, integrity, and availability of the application.
Do I need to act?
~
1.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Supplier Relationship Management
Affected Vendors
References (2)
Permissions Required
https://me.sap.com/notes/3578900
Not Applicable
https://url.sap/sapsecuritypatchday
43
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
5/34 · Minimal
Exposure
5/34 · Minimal