Introduction
Attackers can overwrite critical system files on SAP Print Service deployments without authentication, risking data loss, service disruption, and potentially full system compromise. SAP Print Service (SAPSprint) is widely used to bridge SAP Business Technology Platform applications with on-premises printers, making this vulnerability relevant for any enterprise with SAP cloud-to-local print integration.
About SAP: SAP SE is one of the largest enterprise software vendors globally, powering business operations for over 400,000 customers. Their platforms are central to finance, supply chain, HR, and analytics in organizations of all sizes. Security flaws in SAP products can have wide-ranging impacts across industries.
Technical Information
CVE-2025-42937 is a path traversal vulnerability in SAP Print Service (SAPSprint). The flaw arises from insufficient validation of user-supplied path information. Specifically, the vulnerability is categorized as CWE-35, which covers path traversal issues involving sequences like .../...//
(doubled triple dot slash). This technique can bypass basic filtering that only looks for standard ../
patterns. An unauthenticated attacker can exploit this by submitting crafted path input, traversing parent directories, and overwriting system files that the SAP Print Service process can access. The impact includes compromise of confidentiality, integrity, and availability. No further technical details, code snippets, or endpoint specifics are available in public sources at this time.
Affected Systems and Versions
- Product: SAP Print Service (SAPSprint)
- No specific version numbers or version ranges are publicly disclosed as affected.
- Vulnerable configurations: Any SAP Print Service deployment that processes user-supplied path information without sufficient validation.
Vendor Security History
SAP has a documented history of path traversal vulnerabilities in core products. Notable examples include:
- CVE-2017-12637 (SAP NetWeaver AS Java): Path traversal allowing file disclosure and credential theft, later added to CISA's Known Exploited Vulnerabilities catalog (analysis).
- CVE-2025-30014 (SAP Capital Yield Tax Management): Directory traversal due to insufficient path validation.
SAP maintains a monthly patch cycle and collaborates with external researchers. Despite these efforts, critical vulnerabilities continue to surface, reflecting the complexity of SAP's product landscape.