{"id":3085,"date":"2025-08-13T04:35:27","date_gmt":"2025-08-13T04:35:27","guid":{"rendered":"https:\/\/cert-mu.govmu.org\/cert-mu\/?page_id=3085"},"modified":"2025-08-13T04:36:10","modified_gmt":"2025-08-13T04:36:10","slug":"sap-security-patch-day-fixes-15-flaws-including-3-injection-vulnerabilities","status":"publish","type":"page","link":"https:\/\/cert-mu.govmu.org\/cert-mu\/?page_id=3085","title":{"rendered":"SAP Security Patch Day Fixes 15 Flaws, Including 3 Injection Vulnerabilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3085\" class=\"elementor elementor-3085\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1483ed6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1483ed6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b24b2c2\" data-id=\"b24b2c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e3f6e7 elementor-widget elementor-widget-text-editor\" data-id=\"1e3f6e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SAP released critical security updates on August 12, 2025, addressing 15 vulnerabilities across its enterprise software portfolio, with three severe code injection flaws receiving the highest CVSS scores of 9.9. The monthly Security Patch Day also included four updates to previously\u00a0released\u00a0security notes, highlighting the company\u2019s ongoing commitment to protecting customer environments against evolving threats.<\/p><p>The most severe vulnerabilities patched this month are three code injection flaws that could allow attackers to execute arbitrary code with elevated privileges. Two new critical vulnerabilities, CVE-2025-42957 affecting SAP S\/4HANA and CVE-2025-42950 impacting SAP Landscape Transformation, both received maximum severity ratings. Additionally, SAP updated a previously disclosed code injection vulnerability (CVE-2025-27429) in S\/4HANA that was first patched in April 2025.<\/p><p><strong>Read More: <\/strong><\/p><p><a href=\"https:\/\/gbhackers.com\/sap-security-patch-day-fixes\/\">https:\/\/gbhackers.com\/sap-security-patch-day-fixes\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SAP released critical security updates on August 12, 2025, addressing 15 vulnerabilities across its enterprise software portfolio, with three severe code injection flaws receiving the highest CVSS scores of 9.9. The monthly Security Patch Day also included four updates to previously\u00a0released\u00a0security notes, highlighting the company\u2019s ongoing commitment to protecting customer environments against evolving threats. The most severe vulnerabilities patched this month are three code injection flaws that could allow attackers to execute arbitrary code with elevated privileges. Two new critical vulnerabilities, CVE-2025-42957 affecting SAP S\/4HANA and CVE-2025-42950 impacting SAP Landscape Transformation, both received maximum severity ratings. Additionally, SAP updated a\u2026<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3085","page","type-page","status-publish","hentry"],"blocksy_meta":"","_links":{"self":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/3085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3085"}],"version-history":[{"count":4,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/3085\/revisions"}],"predecessor-version":[{"id":3089,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/3085\/revisions\/3089"}],"wp:attachment":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}