CVE-2025-30760: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. in Oracle Corporation JD Edwards EnterpriseOne Tools
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2025-30760 is a medium-severity vulnerability affecting Oracle Corporation's JD Edwards EnterpriseOne Tools, specifically the Web Runtime SEC component. The affected versions range from 9.2.0.0 through 9.2.9.3. This vulnerability allows a low-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The attacker must have some level of privilege (PR:L) but can operate remotely (AV:N) with low attack complexity (AC:L). Successful exploitation can lead to unauthorized read access to a subset of data and unauthorized update, insert, or delete operations on some accessible data within JD Edwards EnterpriseOne Tools. The vulnerability is classified under CWE-284, indicating an authorization bypass or improper access control issue. The CVSS 3.1 base score is 5.4, reflecting limited confidentiality and integrity impacts but no impact on availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises from insufficient access control in the Web Runtime SEC component, allowing attackers with limited privileges to escalate their capabilities and manipulate or exfiltrate data through HTTP network vectors.
Potential Impact
For European organizations using JD Edwards EnterpriseOne Tools, this vulnerability poses a significant risk to the confidentiality and integrity of business-critical data. JD Edwards is widely used in sectors such as manufacturing, distribution, and finance, where data integrity and confidentiality are paramount. Unauthorized modification or deletion of data could disrupt business operations, lead to financial inaccuracies, and damage trust with customers and partners. The ability to read sensitive data without proper authorization could also result in data breaches, exposing personal or proprietary information subject to GDPR and other regulatory frameworks. Since the attack requires only low privileges and network access, internal threat actors or compromised accounts could exploit this vulnerability to escalate their access, increasing insider threat risks. The lack of user interaction requirement facilitates automated exploitation attempts, potentially increasing the attack surface. Although availability is not impacted, the integrity and confidentiality breaches could lead to regulatory penalties and reputational damage for affected European enterprises.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Conduct an immediate audit of JD Edwards EnterpriseOne Tools deployments to identify affected versions (9.2.0.0 to 9.2.9.3). 2) Restrict network access to the Web Runtime SEC component by implementing strict network segmentation and firewall rules, limiting HTTP access only to trusted management and application servers. 3) Enforce the principle of least privilege rigorously, reviewing and minimizing user privileges to reduce the risk of exploitation by low-privileged attackers. 4) Monitor logs and network traffic for unusual HTTP requests targeting JD Edwards EnterpriseOne Tools, focusing on unauthorized data modification or access attempts. 5) Engage with Oracle support channels to obtain patches or workarounds as soon as they become available and apply them promptly. 6) Implement multi-factor authentication (MFA) for all users with access to JD Edwards systems to reduce the risk of credential compromise. 7) Conduct targeted penetration testing and vulnerability assessments on JD Edwards environments to identify and remediate access control weaknesses. 8) Educate internal teams about this vulnerability to increase awareness and readiness to respond to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-30760: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. in Oracle Corporation JD Edwards EnterpriseOne Tools
Description
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-30760 is a medium-severity vulnerability affecting Oracle Corporation's JD Edwards EnterpriseOne Tools, specifically the Web Runtime SEC component. The affected versions range from 9.2.0.0 through 9.2.9.3. This vulnerability allows a low-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The attacker must have some level of privilege (PR:L) but can operate remotely (AV:N) with low attack complexity (AC:L). Successful exploitation can lead to unauthorized read access to a subset of data and unauthorized update, insert, or delete operations on some accessible data within JD Edwards EnterpriseOne Tools. The vulnerability is classified under CWE-284, indicating an authorization bypass or improper access control issue. The CVSS 3.1 base score is 5.4, reflecting limited confidentiality and integrity impacts but no impact on availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises from insufficient access control in the Web Runtime SEC component, allowing attackers with limited privileges to escalate their capabilities and manipulate or exfiltrate data through HTTP network vectors.
Potential Impact
For European organizations using JD Edwards EnterpriseOne Tools, this vulnerability poses a significant risk to the confidentiality and integrity of business-critical data. JD Edwards is widely used in sectors such as manufacturing, distribution, and finance, where data integrity and confidentiality are paramount. Unauthorized modification or deletion of data could disrupt business operations, lead to financial inaccuracies, and damage trust with customers and partners. The ability to read sensitive data without proper authorization could also result in data breaches, exposing personal or proprietary information subject to GDPR and other regulatory frameworks. Since the attack requires only low privileges and network access, internal threat actors or compromised accounts could exploit this vulnerability to escalate their access, increasing insider threat risks. The lack of user interaction requirement facilitates automated exploitation attempts, potentially increasing the attack surface. Although availability is not impacted, the integrity and confidentiality breaches could lead to regulatory penalties and reputational damage for affected European enterprises.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Conduct an immediate audit of JD Edwards EnterpriseOne Tools deployments to identify affected versions (9.2.0.0 to 9.2.9.3). 2) Restrict network access to the Web Runtime SEC component by implementing strict network segmentation and firewall rules, limiting HTTP access only to trusted management and application servers. 3) Enforce the principle of least privilege rigorously, reviewing and minimizing user privileges to reduce the risk of exploitation by low-privileged attackers. 4) Monitor logs and network traffic for unusual HTTP requests targeting JD Edwards EnterpriseOne Tools, focusing on unauthorized data modification or access attempts. 5) Engage with Oracle support channels to obtain patches or workarounds as soon as they become available and apply them promptly. 6) Implement multi-factor authentication (MFA) for all users with access to JD Edwards systems to reduce the risk of credential compromise. 7) Conduct targeted penetration testing and vulnerability assessments on JD Edwards environments to identify and remediate access control weaknesses. 8) Educate internal teams about this vulnerability to increase awareness and readiness to respond to potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-26T05:52:18.814Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b009a83201eaacd04405
Added to database: 7/15/2025, 7:46:17 PM
Last enriched: 7/23/2025, 1:42:01 AM
Last updated: 8/15/2025, 12:22:45 PM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.