SAP Threat CVE-2025-31324: How to Build Defense-in-Depth for Zero-Day Resilience

April 29, 2025

SAP customers faced a critical attack. A zero-day vulnerability (CVE-2025-31324) in SAP NetWeaver's Visual Composer allowed attackers to exploit a missing authentication and authorization check in the UDDI service. Attackers could upload malicious files via unauthenticated HTTP POST requests with no login needed. This flaw gave threat actors immediate, full control over business-critical ERP systems.

4 min read

SAP customers faced a critical attack. A zero-day vulnerability (CVE-2025-31324) in SAP NetWeaver’s Visual Composer allowed attackers to exploit a missing authentication and authorization check in the UDDI service. Attackers could upload malicious files via unauthenticated HTTP POST requests with no login needed. This flaw gave threat actors immediate, full control over business-critical ERP systems. 

What Happened

  • Discovery and disclosure: ReliaQuest discovered and reported the vulnerability on April 22, 2025. SAP officially released emergency patch Note 3594142 on April 24, 2025.  
  • Attackers gained remote access:
 By abusing the flaw in the Visual Composer component, they uploaded malicious files (webshells) like helper.jsp, cache.jsp and randomly named JSP files directly to the server.  
  • Full system control:
With these files, attackers could run any command, install malware, steal sensitive data, or move to other systems inside the network.  
  • Business disruption:
They could corrupt, update or delete data, shut down SAP applications, or deploy ransomware, seriously impacting business operations.  
  • Evidence erased:
With admin-level access, attackers could delete logs and cover their tracks, making detection and investigation much harder. 

Why It Matters

This wasn’t just a phishing scam or endpoint breach. 
Attackers compromised the core of business operations—ERP systems—where financials, procurement, and sensitive supply chain data live. Even fully updated SAP environments were vulnerable, highlighting the zero-day nature of the attack. 

If left unaddressed, the risks are massive: 

  • Financial Theft: Vendor payments hijacked and diverted to fraudulent accounts 
  • Operational Downtime: Procurement, payroll, and supply chains paralyzed 
  • Data Breach: Loss of contracts, pricing, personal, and payment data 
  • Regulatory Trouble: SOX, GDPR, and SEC violations with steep penalties 
  • Vendor and Supply Chain Damage: Payment disruption and trust breakdowns 
  • Brand and Reputation Hit: Public trust and investor confidence shattered 

ERP systems are now a prime target for financially motivated attackers. Traditional perimeter defenses aren’t enough. 

Immediate Actions SAP Customers Should Take

  • Apply SAP emergency Patch Note 3594142 immediately 
  • Scan /irj/root, /irj/work, and /irj/work/sync directories for suspicious files 
  • Elevate SAP systems in incident response planning and monitoring 

But patching alone isn’t defense-in-depth. 

How Trustmi Provides True Defense-in-Depth—Even When SAP (or Any ERP) Is Breached 

Patching protects the system’s perimeter. 
Trustmi protects your people and money—even when attackers get inside. 

Our platform acts as a critical compensating control, detecting, disrupting, and blocking fraud after a system compromise: 

  • Behavioral Anomaly Detection: Trustmi continuously monitors SAP, finance apps, and email systems for subtle deviations from normal behavior. Example: Vendor updates normally made manually suddenly occur via API automation—Trustmi flags and investigates in real time. 
  • Cross-System Data Correlation: Trustmi connects activity across email, ERP, procurement, and vendor onboarding to detect complex, multi-channel attacks that siloed tools miss. 
  • Real-Time Vendor and Payment Validation: Even if attackers manipulate internal records, Trustmi independently verifies vendors and payment instructions—catching fraud before money moves. 
  • Application and Third-Party Compromise Detection: Trustmi profiles both users and applications. If SAP or other apps start issuing unauthorized payments or vendor changes, Trustmi detects and flags abnormal behavior immediately. 
  • Zero-Day Resilience: Our Behavioral AI adapts to detect emerging threats—providing real zero-day protection beyond static rules or known signatures. 
  • Contextual Alerts for Faster Action: Trustmi alerts provide business context—what was compromised, what financial risk is unfolding (e.g., a suspicious $2.5M vendor payment), and how it deviates from normal behavior—so teams can act fast before losses occur. 

Bottom Line

You can’t always prevent zero-day breaches. 
But with Trustmi, you can stop them from turning into financial losses, fraud, or operational collapse

Even if attackers gain full ERP access, Trustmi’s Behavioral AI security acts as the last line of defense—detecting and blocking financial threats before the money moves. 

To learn more about socially engineered financial fraud

Trusted by Finance and Security Leaders

"Trustmi provided transparency into our payment process to see where cyberattacks and errors were happening and full protection without changing our workflow."

"Like many businesses today, we've experienced cyber attacks on our payment process, but we didn't realize the extent to which we were at risk until we evaluated Trustmi. Now we're confident we'll be able to avoid future attacks with their platform."

"Trustmi's platform is an important tool for our team. Their Payment Flows module increases our payment cycle security, and our team has also managed to cut down the time for preparing payments reports from half a day to half an hour."

$200 Billion Secured

Protecting businesses globally against socially engineered fraud and errors.

Zero Compromise

Stops fraud without disrupting
legitimate payments.

$200 Billion Secured

Protecting businesses globally against socially engineered fraud and errors.

Zero Compromise

Stops fraud without disrupting legitimate payments.

$200 Billion Secured

Protecting businesses globally against socially engineered fraud and errors.

Zero Compromise

Stops fraud without disrupting legitimate payments.

To top