{"uuid": "59edd4c0-17da-4900-aaf3-27f6ab54598c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-42987", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17914", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-42987\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, compromising the integrity of the application.\n\ud83d\udccf Published: 2025-06-10T00:11:45.597Z\n\ud83d\udccf Modified: 2025-06-10T15:15:47.066Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3596850\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-06-10T15:31:16.000000Z"}