{"uuid": "587cf9d7-00d1-4853-8379-054000f1cb4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31331", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10859", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31331\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: SAP NetWeaver allows an attacker to bypass authorization checks, enabling them to view portions of ABAP code that would normally require additional validation. Once logged into the ABAP system, the attacker can run a specific transaction that exposes sensitive system code without proper authorization. This vulnerability compromises the confidentiality.\n\ud83d\udccf Published: 2025-04-08T07:15:23.750Z\n\ud83d\udccf Modified: 2025-04-08T07:15:23.750Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3577131\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-04-08T07:46:16.000000Z"}