CVE-2025-30739: Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. While the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data as well as unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. in Oracle Corporation Oracle CRM Technical Foundation
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.2.11-12.2.13. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. While the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data as well as unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2025-30739 is a vulnerability identified in the Oracle CRM Technical Foundation component of the Oracle E-Business Suite, specifically affecting versions 12.2.11 through 12.2.13. This vulnerability is classified under CWE-863, which relates to improper authorization. The flaw allows a high-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The vulnerability enables unauthorized update, insert, or delete operations on accessible data within the Oracle CRM Technical Foundation, as well as unauthorized read access to a subset of this data. The vulnerability’s scope extends beyond the CRM Technical Foundation itself, potentially impacting additional Oracle products due to shared components or integrations. The CVSS 3.1 base score is 5.5, indicating a medium severity level, with the vector (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N) showing that the attack can be performed remotely over the network with low attack complexity but requires high privileges. The vulnerability affects confidentiality and integrity but does not impact availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability’s exploitation could allow an attacker with existing high privileges to escalate their impact by manipulating critical CRM data, potentially leading to data corruption or unauthorized data disclosure within enterprise environments relying on Oracle CRM Technical Foundation.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to those using Oracle E-Business Suite with the affected CRM Technical Foundation versions. The unauthorized modification or reading of CRM data can lead to data integrity issues, loss of trust in customer relationship management processes, and potential regulatory compliance violations under GDPR if personal data is exposed or altered. The scope change warning indicates that other Oracle products integrated with or dependent on the CRM Technical Foundation could also be compromised, amplifying the impact. This could disrupt business operations, affect customer service quality, and expose sensitive business intelligence. Since the vulnerability requires high privileges, the risk is heightened if internal threat actors or compromised privileged accounts exist. The lack of user interaction needed means automated exploitation is feasible once access is gained. European organizations with complex Oracle deployments, especially in finance, telecommunications, and manufacturing sectors, could face operational and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate review and restriction of high-privilege accounts with network access to Oracle CRM Technical Foundation to minimize the attack surface. 2. Implement strict network segmentation and firewall rules to limit HTTP access to Oracle CRM Technical Foundation components only to trusted administrative hosts. 3. Monitor logs and audit trails for unusual update, insert, or delete operations within the CRM data to detect potential exploitation attempts early. 4. Apply Oracle’s security advisories promptly once patches or mitigations are released, as no official patch is currently linked. 5. Conduct a thorough review of integrations with other Oracle products to identify and secure any extended attack surfaces due to the scope change. 6. Employ multi-factor authentication (MFA) for all high-privilege accounts to reduce the risk of credential compromise. 7. Regularly perform internal penetration testing focusing on privilege escalation and unauthorized data access within Oracle E-Business Suite environments. 8. Educate privileged users about the risks and enforce the principle of least privilege to limit unnecessary access rights.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-30739: Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. While the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data as well as unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. in Oracle Corporation Oracle CRM Technical Foundation
Description
Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.2.11-12.2.13. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. While the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data as well as unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-30739 is a vulnerability identified in the Oracle CRM Technical Foundation component of the Oracle E-Business Suite, specifically affecting versions 12.2.11 through 12.2.13. This vulnerability is classified under CWE-863, which relates to improper authorization. The flaw allows a high-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The vulnerability enables unauthorized update, insert, or delete operations on accessible data within the Oracle CRM Technical Foundation, as well as unauthorized read access to a subset of this data. The vulnerability’s scope extends beyond the CRM Technical Foundation itself, potentially impacting additional Oracle products due to shared components or integrations. The CVSS 3.1 base score is 5.5, indicating a medium severity level, with the vector (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N) showing that the attack can be performed remotely over the network with low attack complexity but requires high privileges. The vulnerability affects confidentiality and integrity but does not impact availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability’s exploitation could allow an attacker with existing high privileges to escalate their impact by manipulating critical CRM data, potentially leading to data corruption or unauthorized data disclosure within enterprise environments relying on Oracle CRM Technical Foundation.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to those using Oracle E-Business Suite with the affected CRM Technical Foundation versions. The unauthorized modification or reading of CRM data can lead to data integrity issues, loss of trust in customer relationship management processes, and potential regulatory compliance violations under GDPR if personal data is exposed or altered. The scope change warning indicates that other Oracle products integrated with or dependent on the CRM Technical Foundation could also be compromised, amplifying the impact. This could disrupt business operations, affect customer service quality, and expose sensitive business intelligence. Since the vulnerability requires high privileges, the risk is heightened if internal threat actors or compromised privileged accounts exist. The lack of user interaction needed means automated exploitation is feasible once access is gained. European organizations with complex Oracle deployments, especially in finance, telecommunications, and manufacturing sectors, could face operational and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate review and restriction of high-privilege accounts with network access to Oracle CRM Technical Foundation to minimize the attack surface. 2. Implement strict network segmentation and firewall rules to limit HTTP access to Oracle CRM Technical Foundation components only to trusted administrative hosts. 3. Monitor logs and audit trails for unusual update, insert, or delete operations within the CRM data to detect potential exploitation attempts early. 4. Apply Oracle’s security advisories promptly once patches or mitigations are released, as no official patch is currently linked. 5. Conduct a thorough review of integrations with other Oracle products to identify and secure any extended attack surfaces due to the scope change. 6. Employ multi-factor authentication (MFA) for all high-privilege accounts to reduce the risk of credential compromise. 7. Regularly perform internal penetration testing focusing on privilege escalation and unauthorized data access within Oracle E-Business Suite environments. 8. Educate privileged users about the risks and enforce the principle of least privilege to limit unnecessary access rights.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-25T20:11:18.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b008a83201eaacd043cb
Added to database: 7/15/2025, 7:46:16 PM
Last enriched: 7/23/2025, 1:33:32 AM
Last updated: 8/15/2025, 4:15:23 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.