Efani<p>🚨 SAP NetWeaver Zero-Day Under Active Exploitation — Patch Immediately</p><p>SAP has released an out-of-band emergency update to fix a critical zero-day vulnerability (CVE-2025-31324) in NetWeaver Visual Composer — and it’s already being exploited in the wild.</p><p>The flaw (CVSS 10.0) allows unauthenticated remote attackers to upload malicious files and gain full remote code execution — no login required.</p><p>Here’s what’s happening:<br>- Threat actors are abusing the `/developmentserver/metadatauploader` endpoint<br>- They're dropping JSP web shells and executing commands directly from browsers<br>- Post-exploitation activity includes tools like Brute Ratel and MSBuild injection for stealth<br>- Even fully patched systems were compromised — confirming this was a true zero-day</p><p>Both ReliaQuest and watchTowr have confirmed active exploitation, with attackers already moving to establish persistence and lateral movement.</p><p>Who’s affected:<br>- SAP NetWeaver Visual Composer 7.50 environments<br>- Systems exposed to the internet, especially if Visual Composer is enabled</p><p>What you need to do:<br>- Apply the emergency patch from SAP (released after the April 8 update)<br>- If you can’t patch immediately:<br> - Restrict access to the vulnerable endpoint<br> - Disable Visual Composer if unused<br> - Forward logs to SIEM and scan for unauthorized servlet uploads</p><p>Also included in the emergency update:<br>- CVE-2025-27429 — Code injection in SAP S/4HANA<br>- CVE-2025-31330 — Code injection in SAP Landscape Transformation</p><p>In a world where zero-days are increasingly exploited within hours of discovery, patching isn’t optional — it’s urgent.</p><p><a href="https://infosec.exchange/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a> <a href="https://infosec.exchange/tags/NetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetWeaver</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>