SAP NetWeaver Under Siege: Cyber Boogeymen Exploit Zero-Day Bug in Second Wave
Cyber villains are back at it again, targeting the SAP NetWeaver bug CVE-2025-31324. This sequel of attacks exploits webshells from the zero-day vulnerability. Researchers have released tools to detect these crafty intrusions, but it seems the bad guys are enjoying their extended stay. Patch those vulnerabilities before the cyber circus comes to town!

Hot Take:
Looks like the hackers are back for round two, and they brought their webshells to the SAP NetWeaver party! Who knew the most popular club in town would be named CVE-2025-31324? SAP better hire some bouncers fast, before their systems get more crowded than a Black Friday sale!
Key Points:
- SAP NetWeaver hit by a second wave of attacks exploiting zero-day vulnerability CVE-2025-31324.
- ReliaQuest found the flaw in the SAP NetWeaver Visual Composer Metadata Uploader.
- Attackers used malicious JSP webshells for remote command execution.
- Onapsis and Mandiant released an open-source scanner to detect exploitation attempts.
- CISA demands federal agencies patch the vulnerability by May 20, 2025.
Already a member? Log in here