SAP NetWeaver in Hot Water: Hackers Exploit Flaws Faster Than You Can Say “Patch”
Guard your SAP NetWeaver like it’s the last donut at the office! Threat actors are exploiting a new vulnerability to upload JSP web shells for unauthorized access and code execution. This flaw lurks in the “metadatauploader” endpoint, letting cybercriminals munch on sensitive data. Stay patched, stay safe, and keep those donuts secure!

Hot Take:
Looks like SAP NetWeaver is the new popular hangout spot for cyber hoodlums wanting to upload their JSP web shells and party like it’s CVE-2017-9844 all over again. With hackers exploiting vulnerabilities faster than you can say “zero-day,” it’s a wonder our digital world hasn’t turned into a complete circus. Maybe it’s time for SAP to consider a bouncer at the “/developmentserver/metadatauploader” entrance. Who knew file uploads could be so dangerous?
Key Points:
- Threat actors are exploiting a vulnerability in SAP NetWeaver to upload malicious JSP web shells.
- This exploitation might be related to the old CVE-2017-9844 or a new unreported RFI issue.
- Some systems were compromised despite running the latest patches, hinting at a possible zero-day vulnerability.
- SAP’s Visual Composer Metadata Uploader is a potential entry point for cyber mischief.
- Coincidentally, SAP has just released a patch for another high-severity flaw, CVE-2025-31324.