SAP NetWeaver Visual Composer Exploitation Attempt

Original Source: [splunk source]
Name:SAP NetWeaver Visual Composer Exploitation Attempt
id:a583b9f1-9c3a-4402-9441-b981654dea6c
version:1
date:2025-04-28
author:Michael Haag, Splunk
status:production
type:Hunting
Description:Detects potential exploitation attempts targeting CVE-2025-31324, a critical unauthenticated file upload vulnerability in SAP NetWeaver Visual Composer. This flaw allows remote attackers to send specially crafted POST requests to the /developmentserver/metadatauploader endpoint, enabling arbitrary file uploads—commonly webshells—resulting in full system compromise. The detection looks for HTTP HEAD or POST requests with a 200 OK status to sensitive Visual Composer endpoints, which may indicate reconnaissance or active exploitation. Successful exploitation can lead to attackers gaining privileged access, deploying malware, and impacting business-critical SAP resources. Immediate patching and investigation of suspicious activity are strongly recommended, as this vulnerability is being actively exploited in the wild.
Data_source:
  • -Suricata
search:| tstats count min(_time) as firstTime max(_time) as lastTime from datamodel=Web.Web where (Web.url IN ("/CTCWebService/CTCWebServiceBean", "/VisualComposer/services/DesignTimeService", "/ctc/CTCWebService/CTCWebServiceBean")) AND Web.http_method IN ("HEAD", "POST") AND Web.status=200 by Web.src, Web.dest, Web.http_method, Web.url, Web.http_user_agent, Web.url_length, sourcetype
| `drop_dm_object_name("Web")`
| eval action=case(http_method="HEAD", "Recon/Probe", http_method="POST", "Possible Exploitation")
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| table firstTime, lastTime, src, dest, http_method, action, url, user_agent, url_length, sourcetype
| `sap_netweaver_visual_composer_exploitation_attempt_filter`


how_to_implement:Ensure that the Web data model is accelerated and populated with web server or web proxy logs capturing HTTP request and response data. This search relies on HTTP method, status code, and URL path fields to identify suspicious access patterns against SAP NetWeaver endpoints.
known_false_positives:Some legitimate administrative activity may access SAP NetWeaver services. However, HEAD or POST requests directly resulting in a 200 OK to Visual Composer endpoints are uncommon and should be investigated carefully.
References:
  -https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
  -https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/
  -https://www.rapid7.com/blog/post/2025/04/28/etr-active-exploitation-of-sap-netweaver-visual-composer-cve-2025-31324/
drilldown_searches:
  :
tags:
  analytic_story:
    - 'SAP NetWeaver Exploitation'
  asset_type:Web Server
  mitre_attack_id:
    - 'T1190'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  security_domain:network
  cve:
    - 'CVE-2025-31324'

tests:
name:'True Positive Test'
 attack_data:
  data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/sap/suricata_sapnetweaver.log
  sourcetype: suricata
  source: suricata
manual_test:None

Related Analytic Stories


SAP NetWeaver Exploitation