Skip to main content

CVE-2025-30759: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. in Oracle Corporation Oracle Business Intelligence Enterprise Edition

Medium
VulnerabilityCVE-2025-30759cvecve-2025-30759
Published: Tue Jul 15 2025 (07/15/2025, 19:27:32 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Business Intelligence Enterprise Edition

Description

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Platform Security). Supported versions that are affected are 7.6.0.0.0, 8.2.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:41:50 UTC

Technical Analysis

CVE-2025-30759 is a vulnerability in Oracle Business Intelligence Enterprise Edition (OBIEE), specifically within the Platform Security component of Oracle Analytics. The affected versions include 7.6.0.0.0, 8.2.0.0.0, and 12.2.1.4.0. This vulnerability allows an unauthenticated attacker with network access via HTTP to compromise the OBIEE system. Exploitation requires human interaction from a user other than the attacker, indicating a social engineering or phishing vector is involved. The vulnerability enables unauthorized update, insert, or delete operations on some accessible data, as well as unauthorized read access to a subset of data within OBIEE. The scope of impact extends beyond OBIEE itself, potentially affecting additional Oracle products integrated or dependent on OBIEE, indicating a scope change. The CVSS 3.1 base score is 6.1, reflecting medium severity, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, no privileges required, but requires user interaction. The vulnerability impacts confidentiality and integrity but not availability. The CWE-284 classification indicates an authorization bypass or insufficient access control issue. No known exploits are reported in the wild yet, and no patches are currently linked, suggesting organizations should prioritize monitoring and mitigation. Given OBIEE’s role in business intelligence and analytics, unauthorized data manipulation or disclosure could lead to significant business risks, including incorrect decision-making and data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-30759 can be significant due to the widespread use of Oracle Business Intelligence Enterprise Edition in sectors such as finance, manufacturing, telecommunications, and government. Unauthorized read access could lead to exposure of sensitive business intelligence data, including financial reports, strategic plans, and customer information, potentially violating GDPR and other data protection regulations. Unauthorized modification of data could corrupt analytics outputs, leading to flawed business decisions and operational disruptions. The scope change implies that other Oracle products integrated with OBIEE might also be compromised, increasing the attack surface and potential damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, which is a common attack vector in Europe. The medium severity score indicates a moderate but non-negligible risk, especially in environments where OBIEE is critical for business operations and decision-making. The lack of known exploits in the wild provides a window for proactive defense, but organizations should not delay in addressing this vulnerability due to the potential for rapid exploitation once public details are widely known.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, they should immediately inventory and identify all instances of OBIEE running affected versions (7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0). Since no patches are currently linked, organizations should monitor Oracle’s security advisories closely for updates or hotfixes. In the interim, restrict network access to OBIEE interfaces to trusted internal networks only, using network segmentation and firewall rules to limit exposure. Implement strict access controls and multi-factor authentication (MFA) for all users accessing OBIEE to reduce the risk of successful social engineering. Conduct targeted user awareness training focusing on phishing and social engineering risks, emphasizing the need to verify unexpected requests related to OBIEE. Enable detailed logging and monitoring of OBIEE access and data modification activities to detect suspicious behavior quickly. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploit attempts. Review and tighten data access policies within OBIEE to minimize the data exposure in case of compromise. Finally, prepare incident response plans specifically addressing potential OBIEE compromises, including data integrity verification and recovery procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b009a83201eaacd04402

Added to database: 7/15/2025, 7:46:17 PM

Last enriched: 7/23/2025, 1:41:50 AM

Last updated: 8/16/2025, 1:07:20 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats