Share
## https://sploitus.com/exploit?id=122DC5AB-E05A-582B-81C7-9AF22AE376F4
# Vulnerability and Indicator of Compromise (IoC) Scanner for CVE-2025-31324 (Visual Composer Metadata Uploader Vulnerability)

[CVE-2025-31324](https://www.google.com/url?q=https://nvd.nist.gov/vuln/detail/CVE-2025-31324&sa=D&source=editors&ust=1745779568690662&usg=AOvVaw1IqVqaCZ9oGfB2iCSZIYC4) is a critical (CVSSv3 10) vulnerability affecting SAP NetWeaver systems, specifically within the Visual Composer Metadata Uploader component. This vulnerability allows unauthenticated attackers to upload arbitrary files to the system, leading to potential remote code execution and complete system compromise.

Recognizing the critical nature of this vulnerability, and observing evidence of active exploitation both by Onapsis Threat Intelligence and reported by multiple IR firms and security researchers, Onapsis developed and is releasing this open-source tool to assist SAP customers. Our goal is to empower information security and SAP administration teams to rapidly assess exposure and evaluate whether their systems could have been targeted or compromised. The Visual Composer/Metadata Uploader component is often present in SAP Java NetWeaver, increasing the risk of unmonitored attack surfaces in enterprise environments.

We will continue to enhance this tool as additional threat intelligence and forensic insights are gathered by our products, research team, and the broader cybersecurity community.

> [!IMPORTANT]  
> LICENSE INFORMATION: This tool is released under the Apache 2.0 open source license. Please see bundled license information.
> DISCLAIMER: This tool is a contribution to the security, incident response, and SAP communities to aid in response to active exploitation of CVE-2025-31324. As of June 6, 2025, this tool is no longer under active development or monitoring. It remains available for future debugging and reference purposes; however, it will not receive further updates, enhancements, or ongoing support. Users should evaluate its applicability based on their current needs and use it at their own discretion. This is a best-effort development and offered as-is with no warranty or liability.

This tool can:

* Identify SAP NetWeaver Java systems potentially vulnerable to CVE-2025-31324.
* Identify presence of specific IOC artifacts.

## Tool Output
<code> python3 Onapsis-Scanner-CVE-2025-31324.py sapserver 50000
[CRITICAL] SAP System at http://sapserver:50000/developmentserver/metadatauploader appears to be vulnerable to CVE-2025-31324.
[CRITICAL] Known webshell found at: http://sapserver:50000/irj/helper.jsp
</code>
<br>
This tool is offered "as is" and without warranty.

## Installation and Prerequisites

The scripts are developed in Python 3 and require you to install the following dependencies:
 <code>
python3 -m venv .venv 
. .venv/bin/activate
pip install -r requirements.txt
 </code>
## Usage

Once you install the dependencies, you can use Python to run the scripts and get Help from the command line.

### Vulnerability Scanning

\# Syntax: python3 \<tool\_name\>.py \<hostname\> \<port\> \<use\_ssl\>

`python3 metadata_uploader_scanner.py example.sap.com 443 true`

\<hostname\> --- Target SAP NetWeaver system (e.g., example.sap.com) 

\<port\> --- Port number (typically 443 for SSL/TLS connections)

\<use\_ssl\> --- Set to true if SSL/TLS is used, or false for plain HTTP

## Additional Resources

For additional information about the SAP Visual Composer vulnerability, the potential business impact, the affected versions and other data points, please review the SAP Visual Composer [Threat Report](https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/) and the following information:

For more information about how Onapsis can help your enterprise identify and address this vulnerability in your environment contact connect@onapsis.com