{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:38:57.802","vulnerabilities":[{"cve":{"id":"CVE-2025-42934","sourceIdentifier":"cna@sap.com","published":"2025-08-12T03:15:25.317","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attacker with user-level privileges can bypass the allowlist and insert untrusted sites into the 'Trusted Sites' configuration by injecting line feed (LF) characters into application inputs. This vulnerability has a low impact on the application's integrity and no impact on confidentiality or availability."},{"lang":"es","value":"La factura de proveedor de SAP S/4HANA es vulnerable a la inyección de CRLF. Un atacante con privilegios de usuario puede eludir la lista de permitidos e insertar sitios no confiables en la configuración de \"Trusted Sites\" inyectando caracteres de salto de línea (LF) en las entradas de la aplicación. Esta vulnerabilidad tiene un impacto mínimo en la integridad de la aplicación y no afecta la confidencialidad ni la disponibilidad."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-113"}]}],"references":[{"url":"https://me.sap.com/notes/3616863","source":"cna@sap.com"},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com"}]}}]}