{"uuid": "17bbaf1c-6c94-4c10-9975-13515e07fe29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43009", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16127", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43009\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: SAP Service Parts Management (SPM) does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. This has low impact on Confidentiality, integrity and availability of the application.\n\ud83d\udccf Published: 2025-05-13T00:19:41.795Z\n\ud83d\udccf Modified: 2025-05-13T14:11:47.930Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/2491817\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-05-13T14:30:47.000000Z"}