Name:SAP NetWeaver Visual Composer Exploitation Attempt id:a583b9f1-9c3a-4402-9441-b981654dea6c version:4 date:2026-03-27 author:Michael Haag, Splunk status:production type:Hunting Description:Detects potential exploitation attempts targeting CVE-2025-31324, a critical unauthenticated file upload vulnerability in SAP NetWeaver Visual Composer.
This flaw allows remote attackers to send specially crafted POST requests to the /developmentserver/metadatauploader endpoint, enabling arbitrary file uploads—commonly webshells—resulting in full system compromise.
The detection looks for HTTP HEAD or POST requests with a 200 OK status to sensitive Visual Composer endpoints, which may indicate reconnaissance or active exploitation.
Successful exploitation can lead to attackers gaining privileged access, deploying malware, and impacting business-critical SAP resources.
Immediate patching and investigation of suspicious activity are strongly recommended, as this vulnerability is being actively exploited in the wild. Data_source:
-Suricata
search:| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime
FROM datamodel=Web.Web WHERE
Web.url IN ( "*/ctc/CTCWebService/CTCWebServiceBean", "*/CTCWebService/CTCWebServiceBean", "*/VisualComposer/services/DesignTimeService" ) Web.http_method IN ("HEAD", "POST") Web.status=200
BY Web.src Web.dest Web.http_method Web.url Web.http_user_agent Web.url_length