{"id":13154,"date":"2025-06-25T10:01:45","date_gmt":"2025-06-25T08:01:45","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=13154"},"modified":"2025-06-25T10:01:45","modified_gmt":"2025-06-25T08:01:45","slug":"sap-security-notes-june-2025","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/","title":{"rendered":"SAP Security Notes, June 2025"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>June 2025 Notes<\/h2>\n<h3>Summary and Highlights of the Month<\/h3>\n<div>\n<p class=\"x_MsoNormal\">This month, the total number of notes was 14, which is 4 fewer than the previous month. We had 1 Hot News this month, 1 less than in the previous period. Regarding high-criticality notes, there are 5, the same as last month. Medium and low-criticality notes will not be reviewed, so <b>we will detail a total of 6 notes<\/b> (all with a CVSS of <span style=\"color: #ffcc00;\"><b>7<\/b><\/span> or higher).<\/p>\n<p class=\"x_MsoNormal\">We have <b>a<\/b> <b>total of 14 notes<\/b> for the entire month (14 new ones).<\/p>\n<p class=\"x_MsoNormal\">We will review in detail a total of 6 notes, all of high criticality and Hot News:<\/p>\n<ol start=\"1\" type=\"1\">\n<li class=\"x_MsoNormal\"><b>One of the most critical notes of the month (CVSS <span style=\"color: #ff0000;\">9.6<\/span>)<\/b> is a High note, related to <b>&#8220;Missing Authorization Check in SAP NetWeaver Application Server for ABAP&#8221;<\/b><\/li>\n<li class=\"x_MsoNormal\">The next one in criticality <b>(CVSS <span style=\"color: #ff0000;\">8.8<\/span>)<\/b> is a note related to <b>&#8220;Information Disclosure in SAP GRC (AC Plugin)&#8221;<\/b><\/li>\n<li class=\"x_MsoNormal\">The next one in criticality <b>(CVSS <span style=\"color: #ff0000;\">8.5<\/span>)<\/b> is a note related to <b>&#8220;Missing Authorization Check in SAP Business Warehouse and SAP Plug-In Basis&#8221;<\/b><\/li>\n<li class=\"x_MsoNormal\">The next one in criticality <b>(CVSS <span style=\"color: #ff0000;\">8.2<\/span>)<\/b> is a note related to <b>&#8220;Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence (BI Workspace)&#8221;<\/b><\/li>\n<li class=\"x_MsoNormal\">The next ones in criticality are 2 medium notes <b>(CVSS <\/b><b><span style=\"color: #ffcc00;\">7.6<\/span><\/b> and <b>CVSS <\/b><span style=\"color: #ffcc00;\"><b>7.5<\/b><\/span><b>)<\/b>, one related to <b>&#8220;Directory Traversal vulnerability in SAP NetWeaver Visual Composer&#8221;<\/b> and the other <b>related to &#8220;Multiple vulnerabilities in SAP MDM Server&#8221;<\/b><\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\">This month, the most predominant type is <b>&#8220;Missing Authorization Check&#8221;<\/b> (6\/14 on patch day)<\/div>\n<\/li>\n<\/ol>\n<p class=\"x_MsoNormal\">In the chart, we can see the <b><u>classification of the June notes<\/u><\/b>, as well as the evolution and classification of the previous 5 months (only Security Tuesday \/ Patch Day notes \u2013 by SAP):<\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-13161\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg\" alt=\"\" width=\"700\" height=\"368\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025-600x315.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<\/div>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol start=\"1\">\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Missing Authorization check in SAP NetWeaver Application Server for ABAP) <u>(<\/u><\/b><b><u><a id=\"OWA05b97cf6-e809-ef55-ff80-19e31a569b98\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3600840\" href=\"https:\/\/me.sap.com\/notes\/3600840\" data-auth=\"NotApplicable\">3600840<\/a><\/u><\/b><b><u>)<\/u>:<\/b>\u00a0RFC inbound processing fails to perform the necessary authorization checks for an authenticated user, resulting in privilege escalation. A successful exploit could have a critical impact on both the integrity and availability of the application. The way to eliminate this risk is by the authorization checks which are now added to initiate S_RFC authorization for tRFC and qRFC calls. Apply the kernel patch and set the profile parameter indicated in the note.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>9,6<\/b><\/span><b>\/ 10 [<\/b><b><u><a id=\"OWA36104caa-5136-86d7-ed9a-0292a763b744\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42989\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42989\" data-auth=\"NotApplicable\">CVE-2025-42989<\/a><\/u><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Missing Authorization check in SAP Business Warehouse and SAP Plug-In Basis<u>\u00a0(<\/u><\/b><b><u><a id=\"OWAa65eb25a-f7e5-f2c8-5bd7-9994285e7c40\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3609271\" href=\"https:\/\/me.sap.com\/notes\/3609271\" data-auth=\"NotApplicable\">3609271<\/a><\/u><\/b><b><u>)<\/u>:<\/b>\u00a0SAP GRC allows a non-administrative user to access and initiate a transaction that could allow them to modify or control transmitted system credentials. This has a significant impact on the confidentiality, integrity, and availability of the application. This problem is solved by preventing the report from running. <b>CVSS v3\u00a0Base Score <\/b> <span style=\"color: #ff0000;\"><b>8,8<\/b><\/span><b>\/ 10 [<\/b><b><u><a id=\"OWAeef434f9-5039-8e43-deba-7593bda90820\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42982\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42982\" data-auth=\"NotApplicable\">CVE-2025-42982<\/a><\/u><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Authentication Bypass Vulnerability in SAP Financial Consolidation (<\/b><b><u><a id=\"OWA104de498-52c3-4184-2785-e4c7541b2808\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3606484\" href=\"https:\/\/me.sap.com\/notes\/3606484\" data-auth=\"NotApplicable\">3606484<\/a><\/u><\/b><b>) <\/b>SAP Business Warehouse and\u00a0SAP Plug-In Basis allow an authenticated attacker to drop arbitrary SAP database tables, potentially resulting in data loss or system inoperability. A successful exploit can completely delete database entries, but cannot read any data. The problem is solved by removing the code in the RFC function module.<b>\u00a0CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,5<\/b><\/span><b>\/ 10\u00a0 [<\/b><b><u><a id=\"OWAa8a27eb0-2ab4-e460-ef00-15177eb4ae75\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42983\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42983\" data-auth=\"NotApplicable\">CVE-2025-42983<\/a><\/u><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>\u00a0Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence (BI Workspace) (<\/b><b><u><a id=\"OWA1e28ef89-fba4-4240-eedd-285ec97a3e7e\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3560693\" href=\"https:\/\/me.sap.com\/notes\/3560693\" data-auth=\"NotApplicable\">3560693<\/a><\/u><\/b><b>): <\/b>SAP BusinessObjects Business Intelligence (BI workspace) allows an unauthenticated attacker to create and store malicious scripts within a workspace. When the victim accesses the workspace, the script will execute in their browser, potentially allowing the attacker to access sensitive session information, modify the session information, or make it unavailable. This results in a high confidentiality impact and a low integrity and availability impact<b>. CVSS v3\u00a0Base Score <\/b><span style=\"color: #ff0000;\"><b>8,2<\/b><\/span><b>\/ 10\u00a0 [<\/b><b><u><a id=\"OWA12a32ae7-c95a-3007-f446-2df4c7bfdacc\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-23192\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-23192\" data-auth=\"NotApplicable\">CVE-2025-23192<\/a><\/u><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Directory Traversal vulnerability in SAP NetWeaver Visual Composer (<\/b><b><u><a id=\"OWAe76efd14-bb1c-c1cb-f7ab-e9793ebc6866\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3610591\" href=\"https:\/\/me.sap.com\/notes\/3610591\" data-auth=\"NotApplicable\">3610591<\/a><\/u><\/b><b>): <\/b>SAP NetWeaver Visual Composer contains a Directory Traversal vulnerability caused by insufficient validation of input paths provided by a high-privilege user. This allows an attacker to read or modify arbitrary files, which has a high confidentiality impact and a low integrity impact<b>. CVSS v3\u00a0Base Score <\/b><span style=\"color: #ffcc00;\"><b>7,6<\/b><\/span><b>\/ 10\u00a0 [<\/b><b><u><a id=\"OWAfaf42bc8-4309-489d-370c-400051540033\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42977\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42977\" data-auth=\"NotApplicable\">CVE-2025-42977<\/a><\/u><\/b><b>]<\/b><\/div>\n<\/li>\n<li>\n<div class=\"elementToProof\" role=\"presentation\"><b>Multiple vulnerabilities in SAP MDM Server (<\/b><b><u><a id=\"OWAb9f8e6bc-6e06-dd84-20bd-871004662860\" class=\"OWAAutoLink\" title=\"https:\/\/me.sap.com\/notes\/3610006\" href=\"https:\/\/me.sap.com\/notes\/3610006\" data-auth=\"NotApplicable\">3610006<\/a><\/u><\/b><b>):<\/b>\u00a0This security advisory addresses three vulnerabilities in SAP MDM Server:<\/div>\n<\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><b>Memory Corruption [CVE-2025-42994]:<\/b>\u00a0The SAP MDM Server ReadString feature allows an attacker to send specially crafted packets that could trigger a memory read access violation in the server process that would crash and exit unexpectedly causing a large availability impact with no impact on the confidentiality and integrity of the application.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><b>Memory Corruption [CVE-2025-42995] :<\/b>\u00a0The SAP MDM server read function allows an attacker to send specially crafted packets that could trigger a memory read access violation in the server process which would crash and exit unexpectedly causing a large impact on availability with no impact on the confidentiality and integrity of the application.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><b>Insecure Session Management [CVE-2025-42996] :<\/b>\u00a0SAP MDM Server allows an attacker to gain control of existing client sessions and execute certain functions without re-authentication, allowing access to or modification of non-sensitive information or consuming sufficient resources that could degrade server performance, resulting in minimal impact to the confidentiality, integrity, and availability of the application.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"elementToProof\" style=\"padding-left: 40px;\">This problem is solves by implementing random generation of session tokens. Apply the latest patch by effectively replacing the main server executable and restarting it. <b>CVSS v3\u00a0Base Score <\/b><span style=\"color: #ffcc00;\"><b>7,5<\/b><\/span><b>\/ 10 [<\/b><b><u><a id=\"OWAf0900ddb-30da-3182-17ba-c1700e2900de\" class=\"OWAAutoLink\" title=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42994\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-42994\" data-auth=\"NotApplicable\">CVE-2025-42994<\/a><\/u><\/b><b>]<\/b><\/p>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (june):<\/p>\n<p class=\"elementToProof\"><b><u><a id=\"OWAb2b04e08-a0c8-7f7a-856e-9a69fd3bbecf\" class=\"OWAAutoLink\" title=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/june-2025.html\" href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/june-2025.html\" data-auth=\"NotApplicable\">SAP Security Patch Day &#8211; June 2025<\/a><\/u><\/b><\/p>\n<p class=\"elementToProof\"><b><u><a id=\"OWAc71dfcb3-f2bf-07d6-b52b-4530a902d8bf\" class=\"OWAAutoLink\" title=\"https:\/\/onapsis.com\/blog\/sap-security-notes-june-2025-patch-day\/\" href=\"https:\/\/onapsis.com\/blog\/sap-security-notes-june-2025-patch-day\/\" data-auth=\"NotApplicable\">SAP Patch Day: June 2025 &#8211; Onapsis<\/a><\/u><\/b><\/p>\n<p class=\"x_MsoNormal\">\n<p>&nbsp;<\/p>\n<p><strong style=\"color: #014888; font-family: inherit; font-size: 1.6rem; letter-spacing: 0em;\"><u>Resources affected<\/u><\/strong><\/p>\n<div class=\"w-post-elm post_content\">\n<p>The full list of affected systems\/components is as follows:<\/p>\n<ul>\n<li>SAP NetWeaver Application Server for ABAP Versions \u2013 KERNEL 7.89, 7.93, 9.14, 9.15<\/li>\n<li>SAP GRC (AC Plugin) Versions \u2013 GRCPINW V1100_700, V1100_731<\/li>\n<li>PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, 758, 914, 915<\/li>\n<li>SAP BusinessObjects Business Intelligence (BI Workspace) Versions \u2013 ENTERPRISE 430, 2025, 2027<\/li>\n<li>SAP NetWeaver Visual Composer Version \u2013 VCBASE 7.50<\/li>\n<li>SAP MDM Server Versions \u2013 MDM_SERVER 710.750<\/li>\n<li>SAP S\/4HANA (Enterprise Event Enablement) Versions \u2013 SAP_GWFND 757, 758<\/li>\n<li>SAP NetWeaver (ABAP Keyword Documentation) Version \u2013 SAP_BASIS 758<\/li>\n<li>SAP S\/4HANA (Manage Central Purchase Contract application) Versions \u2013 S4CORE 106, 107, 108<\/li>\n<li>SAP Business One Integration Framework Versions \u2013 B1_ON_HANA 10.0, SAP-M-BO 10.0<\/li>\n<li>SAP S\/4HANA (Manage Processing Rules &#8211; For Bank Statement) Versions \u2013 S4CORE 104, 105, 106, 107, 108<\/li>\n<li>SAP S\/4HANA (Bank Account Application) Version \u2013 S4CORE 108<\/li>\n<li>SAP Business Objects Business Intelligence Platform Versions &#8211; ENTERPRISE 430, 2025, 2027<\/li>\n<li>SAPUI5 applications Versions \u2013 SAP_UI 750, 754, 755, 756, 757, 758, UI_700 200<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. June 2025 Notes Summary and Highlights of the Month This month, the total number of notes was 14, which is 4 fewer than the previous month. We had 1 Hot News this month,&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13161,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[150],"class_list":["post-13154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2","tag-sap-notes"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, June 2025 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from june 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, June 2025\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from june 2025, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T08:01:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, June 2025\",\"datePublished\":\"2025-06-25T08:01:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/\"},\"wordCount\":1011,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/notas-sap-junio-2025.jpg\",\"keywords\":[\"SAP Notes\"],\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/\",\"name\":\"SAP Security Notes, June 2025 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/notas-sap-junio-2025.jpg\",\"datePublished\":\"2025-06-25T08:01:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from june 2025, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/notas-sap-junio-2025.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/notas-sap-junio-2025.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-june-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, June 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, June 2025 - Inprosec","description":"All updates to SAP systems notes from june 2025, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, June 2025","og_description":"All updates to SAP systems notes from june 2025, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/","og_site_name":"Inprosec","article_published_time":"2025-06-25T08:01:45+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, June 2025","datePublished":"2025-06-25T08:01:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/"},"wordCount":1011,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg","keywords":["SAP Notes"],"articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/","name":"SAP Security Notes, June 2025 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg","datePublished":"2025-06-25T08:01:45+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from june 2025, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/06\/notas-sap-junio-2025.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-june-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, June 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=13154"}],"version-history":[{"count":3,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13154\/revisions"}],"predecessor-version":[{"id":13163,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/13154\/revisions\/13163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13161"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=13154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=13154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=13154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}