SAPocalypse Now: Second Wave of Zero-Day Attacks Hits NetWeaver!
Threat actors have launched a second wave of attacks against SAP NetWeaver instances compromised by a zero-day vulnerability, CVE-2025-31324. This flaw, rated a perfect 10, was disclosed in April 2025. Despite patches, opportunistic hackers are back for round two, proving once again that zero-days are the ultimate party crashers.

Hot Take:
Who let the bugs out? SAP’s NetWeaver is apparently the latest playground for cyber bandits, with threat actors coming back for an encore performance. We thought zero-days were a one-time gig, but looks like they’re headlining again with a vulnerability so serious, it scored a perfect 10! Time to patch those instances, because it seems like the hackers are here for a long-term residency.
Key Points:
– CVE-2025-31324, a zero-day vulnerability in SAP NetWeaver, has a CVSS score of 10/10.
– Threat actors are exploiting this flaw to upload malicious files and deploy JSP webshells.
– A second wave of attacks is leveraging pre-existing webshells from the initial assault.
– Onapsis and Mandiant have released an open-source scanner to detect indicators of compromise.
– Over 200 NetWeaver instances remain vulnerable, with CISA urging patches by May 20.