SAP BusinessObjects Business Intelligence Platform lets an unauthenticated remote attacker send crafted requests through the URL parameter that controls the login page error message. This can cause the server to fetch attacker-supplied URLs, resulting in low impact to confidentiality and integrity, and no impact to availability.
History

Tue, 09 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap businessobjects Business Intelligence Platform
Vendors & Products Sap
Sap businessobjects Business Intelligence Platform

Tue, 09 Dec 2025 02:30:00 +0000

Type Values Removed Values Added
Description SAP BusinessObjects Business Intelligence Platform lets an unauthenticated remote attacker send crafted requests through the URL parameter that controls the login page error message. This can cause the server to fetch attacker-supplied URLs, resulting in low impact to confidentiality and integrity, and no impact to availability.
Title Server-Side Request Forgery (SSRF) in SAP BusinessObjects Business Intelligence Platform
Weaknesses CWE-116
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-12-09T02:15:28.146Z

Updated: 2025-12-09T15:58:44.903Z

Reserved: 2025-04-16T13:25:22.788Z

Link: CVE-2025-42896

cve-icon Vulnrichment

Updated: 2025-12-09T15:58:41.591Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-09T16:17:52.787

Modified: 2025-12-09T18:36:53.557

Link: CVE-2025-42896

cve-icon Redhat

No data.