Skip to main content

CVE-2025-30746: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iStore accessible data as well as unauthorized read access to a subset of Oracle iStore accessible data. in Oracle Corporation Oracle iStore

Medium
VulnerabilityCVE-2025-30746cvecve-2025-30746
Published: Tue Jul 15 2025 (07/15/2025, 19:27:27 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle iStore

Description

Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iStore accessible data as well as unauthorized read access to a subset of Oracle iStore accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:24:24 UTC

Technical Analysis

CVE-2025-30746 is a vulnerability identified in Oracle iStore, a component of the Oracle E-Business Suite specifically related to the Shopping Cart functionality. This vulnerability affects supported versions 12.2.3 through 12.2.14. The flaw allows an unauthenticated attacker with network access via HTTP to exploit the system, but successful exploitation requires human interaction from a user other than the attacker, indicating a social engineering or user-assisted attack vector. The vulnerability is classified under CWE-352, which corresponds to Cross-Site Request Forgery (CSRF), suggesting that the attack leverages the victim's browser to perform unauthorized actions. The vulnerability has a CVSS 3.1 base score of 6.1, indicating a medium severity level. The CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be performed remotely over the network with low attack complexity, requires no privileges, but does require user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to unauthorized read, insert, update, or delete operations on Oracle iStore accessible data, impacting both confidentiality and integrity but not availability. The vulnerability's scope change implies that other integrated Oracle E-Business Suite products could also be impacted, potentially broadening the attack surface. No known exploits are reported in the wild yet, and no patches are currently linked, indicating that organizations should prioritize monitoring and mitigation efforts. The vulnerability's reliance on user interaction suggests phishing or social engineering campaigns could be used to trigger the exploit, emphasizing the need for user awareness and technical controls.

Potential Impact

For European organizations using Oracle E-Business Suite with the iStore component, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive business data, including transactional and customer information managed through the shopping cart system. Unauthorized data manipulation could lead to financial discrepancies, fraudulent transactions, or exposure of sensitive customer data, undermining trust and potentially violating GDPR and other data protection regulations. The scope change increases the risk as it may affect additional integrated Oracle products, amplifying the potential damage. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but could escalate if attackers develop sophisticated social engineering campaigns. Disruption to e-commerce operations could also impact revenue and business continuity. The absence of known exploits currently provides a window for proactive defense, but the widespread use of Oracle E-Business Suite in European enterprises, especially in retail, manufacturing, and distribution sectors, means the vulnerability could be leveraged for targeted attacks or broader campaigns.

Mitigation Recommendations

1. Implement strict input validation and anti-CSRF tokens in Oracle iStore to prevent unauthorized requests. 2. Apply Oracle's security advisories promptly once patches become available; monitor Oracle's official channels for updates. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting the iStore component. 4. Conduct user awareness training focused on recognizing phishing and social engineering attempts that could trigger the required user interaction for exploitation. 5. Restrict network access to Oracle iStore interfaces to trusted IP ranges and enforce HTTPS to secure communications. 6. Monitor logs for unusual activity related to data modification or access patterns within Oracle iStore and integrated products. 7. Use multi-factor authentication (MFA) where possible to reduce the risk of unauthorized access, even though this vulnerability does not require authentication. 8. Segment Oracle E-Business Suite components to limit scope and lateral movement in case of compromise. 9. Regularly review and audit user permissions and data access policies within Oracle iStore to minimize exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b008a83201eaacd043d7

Added to database: 7/15/2025, 7:46:16 PM

Last enriched: 7/23/2025, 1:24:24 AM

Last updated: 8/18/2025, 1:22:23 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats