SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Jul 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system. | |
Title | Multiple Privilege Escalation Vulnerabilities in SAPCAR | |
Weaknesses | CWE-266 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:38:50.441Z
Updated: 2025-07-11T03:55:26.483Z
Reserved: 2025-04-16T13:25:50.942Z
Link: CVE-2025-43001

Updated: 2025-07-08T18:11:23.772Z

Status : Awaiting Analysis
Published: 2025-07-08T01:15:26.047
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-43001

No data.