Skip to main content

CVE-2025-30760: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. in Oracle Corporation JD Edwards EnterpriseOne Tools

Medium
VulnerabilityCVE-2025-30760cvecve-2025-30760
Published: Tue Jul 15 2025 (07/15/2025, 19:27:32 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: JD Edwards EnterpriseOne Tools

Description

Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:42:01 UTC

Technical Analysis

CVE-2025-30760 is a medium-severity vulnerability affecting Oracle Corporation's JD Edwards EnterpriseOne Tools, specifically the Web Runtime SEC component. The affected versions range from 9.2.0.0 through 9.2.9.3. This vulnerability allows a low-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The attacker must have some level of privilege (PR:L) but can operate remotely (AV:N) with low attack complexity (AC:L). Successful exploitation can lead to unauthorized read access to a subset of data and unauthorized update, insert, or delete operations on some accessible data within JD Edwards EnterpriseOne Tools. The vulnerability is classified under CWE-284, indicating an authorization bypass or improper access control issue. The CVSS 3.1 base score is 5.4, reflecting limited confidentiality and integrity impacts but no impact on availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability arises from insufficient access control in the Web Runtime SEC component, allowing attackers with limited privileges to escalate their capabilities and manipulate or exfiltrate data through HTTP network vectors.

Potential Impact

For European organizations using JD Edwards EnterpriseOne Tools, this vulnerability poses a significant risk to the confidentiality and integrity of business-critical data. JD Edwards is widely used in sectors such as manufacturing, distribution, and finance, where data integrity and confidentiality are paramount. Unauthorized modification or deletion of data could disrupt business operations, lead to financial inaccuracies, and damage trust with customers and partners. The ability to read sensitive data without proper authorization could also result in data breaches, exposing personal or proprietary information subject to GDPR and other regulatory frameworks. Since the attack requires only low privileges and network access, internal threat actors or compromised accounts could exploit this vulnerability to escalate their access, increasing insider threat risks. The lack of user interaction requirement facilitates automated exploitation attempts, potentially increasing the attack surface. Although availability is not impacted, the integrity and confidentiality breaches could lead to regulatory penalties and reputational damage for affected European enterprises.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Conduct an immediate audit of JD Edwards EnterpriseOne Tools deployments to identify affected versions (9.2.0.0 to 9.2.9.3). 2) Restrict network access to the Web Runtime SEC component by implementing strict network segmentation and firewall rules, limiting HTTP access only to trusted management and application servers. 3) Enforce the principle of least privilege rigorously, reviewing and minimizing user privileges to reduce the risk of exploitation by low-privileged attackers. 4) Monitor logs and network traffic for unusual HTTP requests targeting JD Edwards EnterpriseOne Tools, focusing on unauthorized data modification or access attempts. 5) Engage with Oracle support channels to obtain patches or workarounds as soon as they become available and apply them promptly. 6) Implement multi-factor authentication (MFA) for all users with access to JD Edwards systems to reduce the risk of credential compromise. 7) Conduct targeted penetration testing and vulnerability assessments on JD Edwards environments to identify and remediate access control weaknesses. 8) Educate internal teams about this vulnerability to increase awareness and readiness to respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b009a83201eaacd04405

Added to database: 7/15/2025, 7:46:17 PM

Last enriched: 7/23/2025, 1:42:01 AM

Last updated: 8/15/2025, 12:22:45 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats