Skip to content
cybersecurity NicoElNino AlamyStockPhoto

Critical SAP Zero-Day Vulnerability: CVE-2025-31324

9f4585ff4c4fcc6f6f54e0eb6b8a4a1c?s=96&d=mm&r=g
Chee-Lun Wung
SAP Security Consultant
April 25, 2025
4 min read

Chapters

Share Article

Let's Talk SAP Security

Have questions about SAP Security? We’re here to help. Contact Us

On April 24, 2025, SAP released a Hotnews about a severe vulnerability within SAP Java systems, which has also been recorded in the NIST database known as CVE-2025-31324. This risk is related to a known component that allows unrestricted uploads. 

We strongly advise customers to review their landscape and proceed where needed to mitigate the risk by either implementing the workaround or applying the correction. Note that the workaround is not a permanent solution. It is only supposed to be used as a quick fix. 

What’s the Risk? 

Depending on how the system was installed, the affected component may or may not come with default installation. For example: if the Java system was only installed as a plain Java stack or if it is the default installation that was part of Solution Manager then the component would not be there.  

To line out what the above means for customers, the following points gives some idea about the risk of your system(s) for CVE-2025-31324. Do note that the risk level varies (for example based on if your SAP Java system is exposed to the internet). 

  • Your SAP landscape includes Java systems 
  • You installed the Visual Composer add-on (Software Component: VCFRAMEWORK)  
  • You have the component installed/active but do not make use of it. 
  • The VISUAL COMPOSER FRAMEWORK component version is lower than the versions listed here: 3594142 
  • You use an outdated version of this add-on lower than lower than 7.5. 
  • The risk adds up if your version is 7.0 and SP is lower than 16, because this was already reported in 2021 as high risk which has a CVSS score of 9.9. See: 3084487, CVE-2021-38163. 

The above points along with the initial analysis suggests that only a small subset of customers meet all these criteria in general, as the component is solely used for developing applications and transaction models changes. 

No public data has been shared regarding the frequency, origin, or methods of exploitation, which makes it difficult to assess the threat’s scale. However, since VCFRAMEWORK may have been separately deployed after the installation of your SAP Java system, it is strongly advised to review your system(s). Even though the vulnerability is about the lack of authorization validation, the overall exploitation risk medium as you would need a user to have access to the system before you can exploit this vulnerability. 

Having that said, if your environment includes this component, it is advised to review whether it is in use. A full system compromise is possible because the component allows potential dangerous file types to be uploaded which can be triggered automatically to run once uploaded. Depending on what kind of executable is uploaded, it may affect the confidentiality, integrity, and availability of the targeted system.  

Resolution Steps 

Refer to SAP Note 3594142 for technical details. 

If use VCFRAMEWORK: 

  • Upgrade to the latest version applicable for your system 

If use VCFRAMEWORK but the version is lower than 7.5, e.g. 7.0: 

  • Immediate action is advised by reviewing all the notes applicable for your version 
  • Upgrade to the latest version applicable for your system 

If You Don’t Use It: 

  • The application can be disabled with various options as a workaround: 
  • SAP Note 3593336 – Unfamiliar files found in SAP NetWeaver Java file system  
  • Or uninstall it: 
  • Either via SAP SUM or telnet, see 
  • SAP Note 3416257 – How to undeploy VC70RUNTIME.SCA via Telnet 
  • This note is about version VC 70, but same procedure can be used.  

Note that even if you decide to uninstall it instead of just applying the temporary workaround. It is advised to still apply the workaround after uninstalling in case the system gets the component installed back in the future, either intentional or not. 

 SecurityBridge customers can also search for relevant Software Component with our Patch Management Tool feature and locate the Software Component ‘VCFRAMEWORK’:  

SAP Vulenrability CVE-2025-31324

For more information on this topic, see these resources:  

  • SAP Workaround for Visual Composer: 3593336 
  • SecurityBridge Knowledge Base article (customers only)