{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:12:35.518","vulnerabilities":[{"cve":{"id":"CVE-2025-42941","sourceIdentifier":"cna@sap.com","published":"2025-08-12T03:15:26.643","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SAP Fiori (Launchpad) is vulnerable to Reverse Tabnabbing vulnerability due to inadequate external navigation protections for its link (<a>) elements. An attacker with administrative user privileges could exploit this by leveraging compromised or malicious pages. While administrative access is necessary for certain configurations, the attacker does not need the administrative privileges to execute the attack. This could result in unintended manipulation of user sessions or exposure of sensitive information. The issue impacts the confidentiality and integrity of the system, but the availability remains unaffected."},{"lang":"es","value":"SAP Fiori (Launchpad) es vulnerable a la vulnerabilidad de tabulación inversa debido a la insuficiente protección de navegación externa para sus elementos de enlace (<a rel=\"nofollow\">). Un atacante con privilegios de administrador podría aprovechar esta vulnerabilidad aprovechando páginas comprometidas o maliciosas. Si bien el acceso administrativo es necesario para ciertas configuraciones, el atacante no necesita privilegios administrativos para ejecutar el ataque. Esto podría resultar en la manipulación involuntaria de sesiones de usuario o la exposición de información confidencial. El problema afecta la confidencialidad e integridad del sistema, pero la disponibilidad permanece intacta.</a>"}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":2.5}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1022"}]}],"references":[{"url":"https://me.sap.com/notes/3624943","source":"cna@sap.com"},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com"}]}}]}