CVE-2025-30759: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. in Oracle Corporation Oracle Business Intelligence Enterprise Edition
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Platform Security). Supported versions that are affected are 7.6.0.0.0, 8.2.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2025-30759 is a vulnerability in Oracle Business Intelligence Enterprise Edition (OBIEE), specifically within the Platform Security component of Oracle Analytics. The affected versions include 7.6.0.0.0, 8.2.0.0.0, and 12.2.1.4.0. This vulnerability allows an unauthenticated attacker with network access via HTTP to compromise the OBIEE system. Exploitation requires human interaction from a user other than the attacker, indicating a social engineering or phishing vector is involved. The vulnerability enables unauthorized update, insert, or delete operations on some accessible data, as well as unauthorized read access to a subset of data within OBIEE. The scope of impact extends beyond OBIEE itself, potentially affecting additional Oracle products integrated or dependent on OBIEE, indicating a scope change. The CVSS 3.1 base score is 6.1, reflecting medium severity, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, no privileges required, but requires user interaction. The vulnerability impacts confidentiality and integrity but not availability. The CWE-284 classification indicates an authorization bypass or insufficient access control issue. No known exploits are reported in the wild yet, and no patches are currently linked, suggesting organizations should prioritize monitoring and mitigation. Given OBIEE’s role in business intelligence and analytics, unauthorized data manipulation or disclosure could lead to significant business risks, including incorrect decision-making and data breaches.
Potential Impact
For European organizations, the impact of CVE-2025-30759 can be significant due to the widespread use of Oracle Business Intelligence Enterprise Edition in sectors such as finance, manufacturing, telecommunications, and government. Unauthorized read access could lead to exposure of sensitive business intelligence data, including financial reports, strategic plans, and customer information, potentially violating GDPR and other data protection regulations. Unauthorized modification of data could corrupt analytics outputs, leading to flawed business decisions and operational disruptions. The scope change implies that other Oracle products integrated with OBIEE might also be compromised, increasing the attack surface and potential damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, which is a common attack vector in Europe. The medium severity score indicates a moderate but non-negligible risk, especially in environments where OBIEE is critical for business operations and decision-making. The lack of known exploits in the wild provides a window for proactive defense, but organizations should not delay in addressing this vulnerability due to the potential for rapid exploitation once public details are widely known.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, they should immediately inventory and identify all instances of OBIEE running affected versions (7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0). Since no patches are currently linked, organizations should monitor Oracle’s security advisories closely for updates or hotfixes. In the interim, restrict network access to OBIEE interfaces to trusted internal networks only, using network segmentation and firewall rules to limit exposure. Implement strict access controls and multi-factor authentication (MFA) for all users accessing OBIEE to reduce the risk of successful social engineering. Conduct targeted user awareness training focusing on phishing and social engineering risks, emphasizing the need to verify unexpected requests related to OBIEE. Enable detailed logging and monitoring of OBIEE access and data modification activities to detect suspicious behavior quickly. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploit attempts. Review and tighten data access policies within OBIEE to minimize the data exposure in case of compromise. Finally, prepare incident response plans specifically addressing potential OBIEE compromises, including data integrity verification and recovery procedures.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-30759: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. in Oracle Corporation Oracle Business Intelligence Enterprise Edition
Description
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Platform Security). Supported versions that are affected are 7.6.0.0.0, 8.2.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-30759 is a vulnerability in Oracle Business Intelligence Enterprise Edition (OBIEE), specifically within the Platform Security component of Oracle Analytics. The affected versions include 7.6.0.0.0, 8.2.0.0.0, and 12.2.1.4.0. This vulnerability allows an unauthenticated attacker with network access via HTTP to compromise the OBIEE system. Exploitation requires human interaction from a user other than the attacker, indicating a social engineering or phishing vector is involved. The vulnerability enables unauthorized update, insert, or delete operations on some accessible data, as well as unauthorized read access to a subset of data within OBIEE. The scope of impact extends beyond OBIEE itself, potentially affecting additional Oracle products integrated or dependent on OBIEE, indicating a scope change. The CVSS 3.1 base score is 6.1, reflecting medium severity, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, no privileges required, but requires user interaction. The vulnerability impacts confidentiality and integrity but not availability. The CWE-284 classification indicates an authorization bypass or insufficient access control issue. No known exploits are reported in the wild yet, and no patches are currently linked, suggesting organizations should prioritize monitoring and mitigation. Given OBIEE’s role in business intelligence and analytics, unauthorized data manipulation or disclosure could lead to significant business risks, including incorrect decision-making and data breaches.
Potential Impact
For European organizations, the impact of CVE-2025-30759 can be significant due to the widespread use of Oracle Business Intelligence Enterprise Edition in sectors such as finance, manufacturing, telecommunications, and government. Unauthorized read access could lead to exposure of sensitive business intelligence data, including financial reports, strategic plans, and customer information, potentially violating GDPR and other data protection regulations. Unauthorized modification of data could corrupt analytics outputs, leading to flawed business decisions and operational disruptions. The scope change implies that other Oracle products integrated with OBIEE might also be compromised, increasing the attack surface and potential damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, which is a common attack vector in Europe. The medium severity score indicates a moderate but non-negligible risk, especially in environments where OBIEE is critical for business operations and decision-making. The lack of known exploits in the wild provides a window for proactive defense, but organizations should not delay in addressing this vulnerability due to the potential for rapid exploitation once public details are widely known.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy beyond generic patching advice. First, they should immediately inventory and identify all instances of OBIEE running affected versions (7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0). Since no patches are currently linked, organizations should monitor Oracle’s security advisories closely for updates or hotfixes. In the interim, restrict network access to OBIEE interfaces to trusted internal networks only, using network segmentation and firewall rules to limit exposure. Implement strict access controls and multi-factor authentication (MFA) for all users accessing OBIEE to reduce the risk of successful social engineering. Conduct targeted user awareness training focusing on phishing and social engineering risks, emphasizing the need to verify unexpected requests related to OBIEE. Enable detailed logging and monitoring of OBIEE access and data modification activities to detect suspicious behavior quickly. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploit attempts. Review and tighten data access policies within OBIEE to minimize the data exposure in case of compromise. Finally, prepare incident response plans specifically addressing potential OBIEE compromises, including data integrity verification and recovery procedures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-26T05:52:18.814Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b009a83201eaacd04402
Added to database: 7/15/2025, 7:46:17 PM
Last enriched: 7/23/2025, 1:41:50 AM
Last updated: 8/16/2025, 1:07:20 AM
Views: 22
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.