{"uuid": "f53f2fc4-1019-40eb-8fb5-1a6a606cd11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43010", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16128", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43010\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL)) allows an authenticated attacker with SAP standard authorization to execute a certain function module remotely and replace arbitrary ABAP programs, including SAP standard programs. This is due to lack of input validation and no authorization checks. This has low Confidentiality impact but high impact on integrity and availability to the application.\n\ud83d\udccf Published: 2025-05-13T00:19:51.184Z\n\ud83d\udccf Modified: 2025-05-13T14:11:28.429Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3600859\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-05-13T14:30:48.000000Z"}