CVE-2025-31324 — SAP NetWeaver Visual Composer Metadata Uploader – Deserialization

Bar Refael

April 30, 2025

Summary

  • CVE ID: CVE-2025-31324
  • Discovered by: iamnoooob, rootxharsh, parthmalhotra, pdresearch
  • Severity: Critical
  • CVSS v3.1 Score: 10.0
  • CWE ID: CWE-434 (Unrestricted Upload of File with Dangerous Type)
  • Status: Verified
  • EPSS Score: 0.00043 (Percentile: 12.532%)

Description

SAP NetWeaver Visual Composer Metadata Uploader is vulnerable to unauthenticated access, allowing remote attackers to upload and potentially execute arbitrary serialized Java objects. The service lacks adequate authorization controls, exposing it to deserialization attacks which can lead to full system compromise.

This vulnerability allows a threat actor to upload executable binaries and initiate remote code execution (RCE), severely compromising the confidentiality, integrity, and availability of affected systems.

Additionally, OP Innovate’s ASM scanner has integrated detection capabilities for this specific vulnerability, enabling proactive identification and mitigation of at-risk assets within an organization’s digital perimeter.

Technical Analysis

  • Attack Vector: Remote, unauthenticated HTTP POST request

Affected Endpoint:

/developmentserver/metadatauploader?CONTENTTYPE=MODEL&CLIENT=1

  • Exploit Method: Java deserialization of crafted base64 payload embedded in a multipart form
  • Indicators of Exploitation:
    • Multipart POST requests to the uploader endpoint
    • Base64-encoded Java serialized objects
    • Response body with error strings like “FAILED” and “Cause”
    • External DNS lookups confirming out-of-band exploitation

Proof of Concept

The vulnerability can be verified using a serialized Java object embedded in a .properties file uploaded to the vulnerable endpoint. OAST (Out-of-Band Application Security Testing) platforms such as Interactsh confirm exploitation via DNS interaction.

Mitigation

  • Patch Available: Yes – Apply SAP Security Note 3594142
  • SAP Patch Day Details: https://url.sap/sapsecuritypatchday
  • Other Recommendations:
    • Restrict access to SAP development components
    • Implement strict validation on file uploads
    • Monitor for anomalous traffic to the uploader endpoint

Detection Guidance

  • WASP: OP Innovate has developed and deployed a dedicated WASP scanner specifically designed to identify insecure deserialization vulnerabilities, including CVE-2025-31324. This scanner is currently operational and actively scanning for affected SAP NetWeaver components, providing targeted detection for externally and internally exposed systems.
  • Network Monitoring: Flag unauthenticated multipart/form-data POST requests, especially to /developmentserver/metadatauploader.
  • Payload Inspection: Detect base64-encoded Java serialized object patterns within upload requests.
  • Threat Intelligence: Utilize OP Innovate ASM scanner, WASP, or equivalent reconnaissance tools to map and identify vulnerable assets across the organization’s external and internal environments.

Conclusion

CVE-2025-31324 represents a highly critical risk to SAP NetWeaver environments due to its unauthenticated remote code execution potential via unsafe Java deserialization. The availability of a working proof-of-concept and its exploitation in the wild underscore the urgent need for patching and hardening exposed systems. Organizations should immediately apply the recommended SAP patches and leverage tools like OP Innovate’s ASM scanner to identify and remediate vulnerable instances. Comprehensive monitoring, access control, and input validation measures are essential to prevent exploitation and limit potential impact.

Stay Secure. Stay Informed.

OP Innovate Research Team.