Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

SAP NetWeaver Visual Composer exploitation campaign

Type
Campaign
Actors
❓Unknown
Pub. date
April 22, 2025
Initial access
0-day vulnerability
Impact
Unknown
Observed techniques
Webshell deploymentVulnerability exploitation
Observed tools
Brute RatelHeaven’s Gate
Targeted technologies
SAP NetWeaver
References
https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
Status
Finalized
Last edited
May 11, 2025 2:57 PM

CVE-2025-31324 is a critical zero-day vulnerability in the SAP NetWeaver Visual Composer component (CVSS 10.0) that enables unauthenticated remote code execution (RCE). The flaw, caused by missing authorization checks in the Metadata Uploader interface, allows attackers to upload arbitrary executable files—most commonly webshells—via specially crafted HTTP requests. First observed in active use in early 2025, the campaign evolved from reconnaissance to full compromise, with attackers achieving system-level access using the <sid>adm account.

After initial exploitation, attackers deployed webshells (e.g., helper.jsp, cache.jsp) that granted full remote access. Some systems were later abused by opportunistic attackers in a second wave, reusing webshells for actions like cryptominer deployment.

Made with 💙 by Wiz

Last Updated: April 3, 2025