Event

TGIT
1/8

Video

IBM
2/8

Quiz

Quiz
3/8

Award

cnapp-v3
4/8

eBook

cnapp-v3
5/8

What's New?

AI icon

Don't just use AI,
Secure AI with AccuKnox AI-SPM!

PRODUCT TOUR
6/8

Blog

mssp

Why is AccuKnox the most MSSP ready CNAPP?

LEARN MORE
7/8

Comparison

Comparison

Searching for Alternative CNAPP?

COMPARE NOW
8/8
CVE-2025-31324-SAP

CVE-2025-31324: Critical SAP NetWeaver Visual Composer Zero-Day (10.0 CVSS)

 |  May 28, 2025

CVE-2025-31324 represents a critical zero-day vulnerability in SAP NetWeaver Visual Composer, boasting a perfect 10.0 CVSS severity score. This flaw allows for unauthorized file uploads, posing a significant risk of remote code execution and server compromise. AccuKnox offers comprehensive CNAPP solutions to defend against such sophisticated threats.

Reading Time: 6 minutes

TL;DR

  • CVE-2025-31324 is a critical zero-day in SAP NetWeaver Visual Composer with a CVSS 10.0, allowing unauthenticated remote code execution via unrestricted file upload.
  • The vulnerability exploits the unsecured /developmentserver/metadatauploader endpoint to upload malicious JSP webshells.
  • Major APT and ransomware groups like BianLian and RansomEXX are actively exploiting unpatched systems.
  • Immediate fixes include applying SAP Security Note 3594142, patching NetWeaver, and disabling the deprecated Visual Composer module.
  • AccuKnox’s File Integrity Monitoring detects and blocks unauthorized file uploads, safeguarding critical SAP directories against exploitation.

In April 2025, the global cybersecurity community confronted a new and exceptionally dangerous vulnerability in SAP’s flagship middleware platform, SAP NetWeaver Visual Composer. Tracked as CVE-2025-31324, this flaw carries a CVSS 3.1 score of 10.0, reflecting its catastrophic impact potential. SAP NetWeaver underpins many core enterprise business processes spanning ERP, CRM, and supply chain functions across financial institutions, critical infrastructure, manufacturing, and government sectors worldwide.

What makes CVE-2025-31324 particularly alarming is the ability for unauthenticated, remote attackers to execute arbitrary code via an unrestricted file upload flaw, effectively handing adversaries complete control over critical SAP application servers. The vulnerability lies in a legacy Visual Composer component that remains enabled in many organizations despite its formal deprecation, exposing a vast attack surface with minimal barriers.

For SOC teams, SAP administrators, and CISOs responsible for safeguarding these vital assets, understanding the full scope of this vulnerability, from exploitation mechanics to threat actor behavior, is paramount. This blog delivers a comprehensive, technical breakdown and strategic guidance to defend against this evolving threat.

What is CVE-2025-31324?

Simply put, CVE-2025-31324 is an unrestricted file upload vulnerability in the Visual Composer module of SAP NetWeaver Application Server Java (AS Java). It enables unauthenticated remote attackers to upload malicious JSP files (webshells) directly into sensitive SAP application directories without any input validation or authorization checks.

N Day Test
webshell

Once a webshell is uploaded, attackers can remotely execute commands, escalate privileges, persist undetected, and move laterally inside enterprise networks, all through HTTP requests to the compromised SAP server.

The vulnerable endpoint at the heart of this flaw is: /developmentserver/metadatauploader

Originally intended to facilitate metadata handling and application development workflows, it lacks critical security controls, turning it into a vector for complete compromise. The root cause of CVE-2025-31324 lies in an inadequate validation and authentication mechanism in the Visual Composer’s metadata uploader endpoint. The server blindly accepts multipart/form-data POST requests containing files and saves them under the following directory without verifying the content type or enforcing access control: /j2ee/cluster/apps/sapcom/irj/servlet_jsp/irj/root/

Timeline of Discovery

  1. April 22, 2025: Initial detection by ReliaQuest’s threat intelligence team during proactive monitoring of suspicious file uploads to SAP environments.
  2. May 2, 2025: Follow-up detection reports expand to include novel JSP webshell variants like rrx.jsp, indicating attacker innovation.
  3. May 14, 2025: Intelligence analysis attributes exploitation campaigns to notorious APT and ransomware groups, including BianLian and RansomEXX (Storm-2460), revealing high-risk threat actor interest.

Systems Affected

  • SAP NetWeaver Application Server Java (AS Java) versions before the April 24, 2025, patch.
  • Environments with the Visual Composer component enabled — a module deprecated since 2015, but still frequently left enabled due to legacy dependencies
  • Systems exposing the /developmentserver context path publicly or over trusted networks.
  • Both on-premises and hybrid cloud SAP deployments are leveraging older NetWeaver stacks without aggressive hardening.

Notably, many government, manufacturing, and critical infrastructure operators still run unpatched Visual Composer instances, widening the attacker’s reach.

Exploitation Steps

An unauthenticated attacker can exploit CVE-2025-31324 by sending a specially crafted HTTP POST request to the vulnerable /developmentserver/metadatauploader endpoint, uploading a malicious .jsp webshell. This file is then saved to a web-accessible directory, typically under /irj/, without any authentication or validation. The attacker can subsequently trigger the webshell by issuing an HTTP GET request to a URL such as https://<sap_server>/irj/helper.jsp?cmd=id, where the cmd parameter contains arbitrary operating system commands. The server executes these commands in real time and returns the output directly in the HTTP response. 

This attack flow exposes several critical security failures: the absence of authentication checks for file uploads, no restrictions on file type or extension, and no execution controls or sandboxing on uploaded content. 

While the vulnerable endpoint is not exposed by default, it is frequently accessible in real-world SAP environments due to legacy configurations or misconfigured deployments. Together, these weaknesses form a highly effective remote code execution (RCE) pathway that adversaries can easily exploit.

How to Mitigate CVE-2025-31324

Immediate Remediation Steps

  1. Patch Deployment:
    • Apply SAP Security Note 3594142 without delay.
    • Upgrade SAP NetWeaver AS Java instances to the latest patched versions.
  2. Disable Deprecated Components:
    • Remove or disable the Visual Composer module entirely
    • Remove the /developmentserver application alias from web.xml and SAP configs.
  3. Log Aggregation & Monitoring:
    • Forward SAP logs (IIS/Apache and SAP Java server logs) to centralized SIEM/SOAR platforms.
    • Enable alerts for suspicious HTTP requests or JSP execution.
  4. File Integrity Checks:
    • Regularly scan SAP deployment directories for unauthorized .jsp, .class, or .java files.

How AccuKnox’s File Integrity Monitoring Addresses CVE-2025-31324

AccuKnox’s FIM, configured to monitor critical SAP NetWeaver directories like /usr/sap/ or specific Visual Composer component paths, would have immediately detected any unauthorized file uploads. This proactive blocking prevents malicious payloads from even being written to disk.
By setting key directories to readOnly: true, AccuKnox would have blocked attempts to create new, unauthorized files, a core component of the CVE-2025-31324 exploitation vector.
Real-time notifications of any suspicious file activity would provide crucial early warning.
Maintaining the integrity of core SAP system binaries and configuration files would prevent further compromise, even post-exploitation.
critical assets
policies

Long-Term Strategic Measures

  • Conduct SAP security posture reviews focusing on legacy modules and unused components.
  • Implement application-layer filtering and runtime protection for SAP Java environments.
  • Harden SAP communication channels with mutual TLS and authentication.
  • Enforce the principle of least privilege on SAP users and services.
  • Perform regular red team exercises simulating RCE attacks via file uploads.

Conclusion

CVE-2025-31324 is an unambiguous wake-up call for the SAP ecosystem: decades-old, deprecated modules left unpatched and exposed create a perfect environment for adversaries to breach critical infrastructure. The vulnerability’s ideal storm of unauthenticated, unrestricted file upload and legacy exposure translates into a near-absolute takeover risk for vulnerable SAP NetWeaver environments.

The rapid weaponization by sophisticated ransomware and APT groups heightens the urgency. SOC teams must treat this vulnerability as a top-priority incident, accelerating patching, threat hunting, and hardening efforts.

SAP administrators and CISOs should leverage this incident as a catalyst for comprehensive SAP security modernization, disabling legacy modules, enforcing robust access controls, and integrating SAP logs into enterprise detection frameworks.

Effective mitigation requires speed, vigilance, and strategic investment to protect SAP’s critical role in enterprise operations against an increasingly hostile cyber threat landscape.

Ready for a personalized security assessment?

“Choosing AccuKnox was driven by opensource KubeArmor’s novel use of eBPF and LSM technologies, delivering runtime security”

idt

Golan Ben-Oni

Chief Information Officer

“At Prudent, we advocate for a comprehensive end-to-end methodology in application and cloud security. AccuKnox excelled in all areas in our in depth evaluation.”

prudent

Manoj Kern

CIO

“Tible is committed to delivering comprehensive security, compliance, and governance for all of its stakeholders.”

tible

Merijn Boom

Managing Director