{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T02:45:20.474","vulnerabilities":[{"cve":{"id":"CVE-2025-42973","sourceIdentifier":"cna@sap.com","published":"2025-07-08T01:15:24.623","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Due to a Cross-Site Scripting vulnerability in SAP Data Services Management Console, an authenticated attacker could exploit the search functionality associated with DQ job status reports. By intercepting requests, malicious script can be injected and subsequently executed when a user loads the affected page. This results in a limited impact on the confidentiality and integrity of user session information, while availability remains unaffected."},{"lang":"es","value":"Debido a una vulnerabilidad de Cross-Site Scripting en SAP Data Services Management Console, un atacante autenticado podría explotar la funcionalidad de búsqueda asociada a los informes de estado de los trabajos de DQ. Al interceptar las solicitudes, se puede inyectar un script malicioso y ejecutarlo cuando un usuario carga la página afectada. Esto tiene un impacto limitado en la confidencialidad e integridad de la información de la sesión del usuario, sin afectar la disponibilidad."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://me.sap.com/notes/3606103","source":"cna@sap.com"},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com"}]}}]}