CVE-2025-50060: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle BI Publisher accessible data as well as unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. in Oracle Corporation Oracle BI Publisher
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). Supported versions that are affected are 7.6.0.0.0, 8.2.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle BI Publisher accessible data as well as unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI Analysis
Technical Summary
CVE-2025-50060 is a high-severity vulnerability affecting Oracle BI Publisher, a component of Oracle Analytics responsible for generating and managing business intelligence reports. The vulnerability exists in the web server component of Oracle BI Publisher versions 7.6.0.0.0, 8.2.0.0.0, and 12.2.1.4.0. It allows a low-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The vulnerability is classified under CWE-284, which relates to improper access control. Exploitation of this flaw can lead to unauthorized creation, deletion, or modification of critical data or any data accessible through Oracle BI Publisher. The attacker can gain unauthorized access to sensitive data or even complete access to all data accessible by the Oracle BI Publisher instance. The CVSS 3.1 base score is 8.1, indicating a high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H) and integrity (I:H), but no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk to organizations relying on Oracle BI Publisher for critical business intelligence reporting, as it could lead to data breaches, data tampering, and loss of trust in reporting accuracy.
Potential Impact
For European organizations, the impact of CVE-2025-50060 can be substantial. Oracle BI Publisher is widely used in enterprise environments for generating reports that often contain sensitive business, financial, and operational data. Unauthorized access or modification of such data can lead to breaches of confidentiality, potentially violating GDPR and other data protection regulations, resulting in legal and financial penalties. Integrity compromise can undermine decision-making processes and operational reliability. Since the vulnerability can be exploited remotely over HTTP with low privileges and no user interaction, attackers could leverage this flaw to escalate privileges or move laterally within networks. This could affect sectors such as finance, manufacturing, healthcare, and government agencies that rely heavily on Oracle BI Publisher for analytics and reporting. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent potential exploitation. The lack of availability impact means systems may remain operational while compromised, making detection more difficult and increasing the risk of prolonged unauthorized access.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify all Oracle BI Publisher instances running affected versions (7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0). Until an official patch is released, organizations should implement strict network segmentation and firewall rules to restrict HTTP access to Oracle BI Publisher servers only to trusted internal IPs or VPN users. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting Oracle BI Publisher endpoints. Monitor logs for unusual activity, especially unauthorized creation, deletion, or modification attempts. Enforce the principle of least privilege for user accounts interacting with Oracle BI Publisher, ensuring that only necessary privileges are granted. Consider disabling or restricting HTTP access if possible, or migrating to HTTPS with strong authentication mechanisms. Regularly check Oracle’s security advisories for patches or updates addressing this vulnerability and apply them promptly. Additionally, implement anomaly detection systems to identify potential exploitation attempts and conduct penetration testing focused on Oracle BI Publisher to validate the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-50060: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle BI Publisher accessible data as well as unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. in Oracle Corporation Oracle BI Publisher
Description
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). Supported versions that are affected are 7.6.0.0.0, 8.2.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle BI Publisher accessible data as well as unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-50060 is a high-severity vulnerability affecting Oracle BI Publisher, a component of Oracle Analytics responsible for generating and managing business intelligence reports. The vulnerability exists in the web server component of Oracle BI Publisher versions 7.6.0.0.0, 8.2.0.0.0, and 12.2.1.4.0. It allows a low-privileged attacker with network access via HTTP to exploit the system without requiring user interaction. The vulnerability is classified under CWE-284, which relates to improper access control. Exploitation of this flaw can lead to unauthorized creation, deletion, or modification of critical data or any data accessible through Oracle BI Publisher. The attacker can gain unauthorized access to sensitive data or even complete access to all data accessible by the Oracle BI Publisher instance. The CVSS 3.1 base score is 8.1, indicating a high severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H) and integrity (I:H), but no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk to organizations relying on Oracle BI Publisher for critical business intelligence reporting, as it could lead to data breaches, data tampering, and loss of trust in reporting accuracy.
Potential Impact
For European organizations, the impact of CVE-2025-50060 can be substantial. Oracle BI Publisher is widely used in enterprise environments for generating reports that often contain sensitive business, financial, and operational data. Unauthorized access or modification of such data can lead to breaches of confidentiality, potentially violating GDPR and other data protection regulations, resulting in legal and financial penalties. Integrity compromise can undermine decision-making processes and operational reliability. Since the vulnerability can be exploited remotely over HTTP with low privileges and no user interaction, attackers could leverage this flaw to escalate privileges or move laterally within networks. This could affect sectors such as finance, manufacturing, healthcare, and government agencies that rely heavily on Oracle BI Publisher for analytics and reporting. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent attention to prevent potential exploitation. The lack of availability impact means systems may remain operational while compromised, making detection more difficult and increasing the risk of prolonged unauthorized access.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify all Oracle BI Publisher instances running affected versions (7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0). Until an official patch is released, organizations should implement strict network segmentation and firewall rules to restrict HTTP access to Oracle BI Publisher servers only to trusted internal IPs or VPN users. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting Oracle BI Publisher endpoints. Monitor logs for unusual activity, especially unauthorized creation, deletion, or modification attempts. Enforce the principle of least privilege for user accounts interacting with Oracle BI Publisher, ensuring that only necessary privileges are granted. Consider disabling or restricting HTTP access if possible, or migrating to HTTPS with strong authentication mechanisms. Regularly check Oracle’s security advisories for patches or updates addressing this vulnerability and apply them promptly. Additionally, implement anomaly detection systems to identify potential exploitation attempts and conduct penetration testing focused on Oracle BI Publisher to validate the effectiveness of mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.109Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00aa83201eaacd0441c
Added to database: 7/15/2025, 7:46:18 PM
Last enriched: 7/22/2025, 8:31:06 PM
Last updated: 8/20/2025, 4:11:19 PM
Views: 15
Related Threats
CVE-2025-8193
LowCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.