We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-42970

Directory Traversal vulnerability in SAPCAR



Description

SAPCAR improperly sanitizes the file paths while extracting SAPCAR archives. Due to this, an attacker could craft a malicious SAPCAR archive containing directory traversal sequences. When a high privileged victim extracts this malicious archive, it is then processed by SAPCAR on their system, causing files to be extracted outside the intended directory and overwriting files in arbitrary locations. This vulnerability has a high impact on the integrity and availability of the application with no impact on confidentiality.

Reserved 2025-04-16 | Published 2025-07-08 | Updated 2025-07-08 | Assigner sap


MEDIUM: 5.8CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory

Product status

Default status
unaffected

SAP_CAR 7.53
affected

7.22EXT
affected

References

me.sap.com/notes/3595156

url.sap/sapsecuritypatchday

cve.org (CVE-2025-42970)

nvd.nist.gov (CVE-2025-42970)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-42970

Support options

Helpdesk Chat, Email, Knowledgebase