
CVE-2025-43001 – Multiple Privilege Escalation Vulnerabilities in SAPCAR
https://notcve.org/view.php?id=CVE-2025-43001
08 Jul 2025 — SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system. • https://me.sap.com/notes/3595143 • CWE-266: Incorrect Privilege Assignment •

CVE-2025-42992 – Multiple Privilege Escalation Vulnerabilities in SAPCAR
https://notcve.org/view.php?id=CVE-2025-42992
08 Jul 2025 — SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system. • https://me.sap.com/notes/3595143 • CWE-266: Incorrect Privilege Assignment •

CVE-2025-42971 – Memory Corruption vulnerability in SAPCAR
https://notcve.org/view.php?id=CVE-2025-42971
08 Jul 2025 — A memory corruption vulnerability exists in SAPCAR allowing an attacker to craft malicious SAPCAR archives. When a high privileged victim extracts this malicious archive, it gets processed by SAPCAR on their system, resulting in out-of-bounds memory read and write. This could lead to file extraction and file overwrite outside the intended directories. This vulnerability has low impact on the confidentiality, integrity and availability of the application. • https://me.sap.com/notes/3595141 • CWE-787: Out-of-bounds Write •

CVE-2025-42970 – Directory Traversal vulnerability in SAPCAR
https://notcve.org/view.php?id=CVE-2025-42970
08 Jul 2025 — SAPCAR improperly sanitizes the file paths while extracting SAPCAR archives. Due to this, an attacker could craft a malicious SAPCAR archive containing directory traversal sequences. When a high privileged victim extracts this malicious archive, it is then processed by SAPCAR on their system, causing files to be extracted outside the intended directory and overwriting files in arbitrary locations. This vulnerability has a high impact on the integrity and availability of the application with no impact on con... • https://me.sap.com/notes/3595156 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-26100
https://notcve.org/view.php?id=CVE-2022-26100
08 Mar 2022 — SAPCAR - version 7.22, does not contain sufficient input validation on the SAPCAR archive. As a result, the SAPCAR process may crash, and the attacker may obtain privileged access to the system. SAPCAR - versión 7.22, no contiene suficiente comprobación de entradas en el archivo SAPCAR. Como resultado, el proceso SAPCAR puede fallar, y el atacante puede obtener acceso privilegiado al sistema • https://dam.sap.com/mac/embed/public/pdf/a/ucQrx6G.htm?rc=10 • CWE-20: Improper Input Validation CWE-129: Improper Validation of Array Index •