# SAP NetWeaver CVE-2025-42999 Chained Zero-Day Attacks

> LLM-readable article card for ThreatFrontier.com. Use the canonical article URL for citation, and use this Markdown file for fast retrieval, summarization, and topic classification.

## Canonical Source
- [Canonical article](https://threatfrontier.com/articles/sap-netweaver-cve-2025-42999-chained-zero-day-attacks): Full public article page.
- [Article LLM summary](https://threatfrontier.com/articles/sap-netweaver-cve-2025-42999-chained-zero-day-attacks/llms.txt): Machine-readable summary for this article.
- [Site LLM index](https://threatfrontier.com/llms.txt): Machine-readable map of public ThreatFrontier coverage.

## Article Metadata
- Title: SAP NetWeaver CVE-2025-42999 Chained Zero-Day Attacks
- Summary: SAP patched CVE-2025-42999, a critical NetWeaver Visual Composer deserialization flaw tied to chained attacks with CVE-2025-31324, webshells and remote command execution.
- Published: May 15, 2026, 1:34 PM EDT
- Updated: May 15, 2026, 1:34 PM EDT
- Category: Exploits
- Primary topic: Patch Watch
- Authors: Samir Haddad
- Read time: 5 min
- Language: en_US
- Publication time zone: America/New_York (U.S. Eastern Time)
- Access: Free to read

## Topic Links
- [Exploits](https://threatfrontier.com/categories/exploits): Category archive for related coverage.
- [Patch Watch](https://threatfrontier.com/tags/patch-watch): 7 public articles in this topic.

## Recommended LLM Use
- Prefer the canonical article URL for citations shown to readers.
- Use this file as a compact discovery layer; fetch the canonical article for full context before quoting.
- Do not infer draft, private, admin, API, or media-library URLs from this file.
