Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50067: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. in Oracle Corporation Oracle Application Express

0
Critical
VulnerabilityCVE-2025-50067cvecve-2025-50067
Published: Tue Jul 15 2025 (07/15/2025, 19:27:36 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Application Express

Description

Vulnerability in Oracle Application Express (component: Strategic Planner Starter App). Supported versions that are affected are 24.2.4 and 24.2.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:08:34 UTC

Technical Analysis

CVE-2025-50067 is a critical security vulnerability identified in Oracle Application Express (APEX), specifically within the Strategic Planner Starter App component in versions 24.2.4 and 24.2.5. The vulnerability is classified under CWE-601, which typically relates to URL redirection or forwarding issues, suggesting that it may involve improper handling of URLs leading to security bypass or redirection attacks. This flaw allows a low-privileged attacker with network access via HTTP to exploit the system, but successful exploitation requires user interaction from a third party, such as clicking a malicious link or performing an action initiated by the attacker. The vulnerability's scope is notable because while it resides in Oracle Application Express, exploitation can impact additional Oracle products, indicating a scope change that broadens the attack surface. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network attack vector, low attack complexity, low privileges required, user interaction required, scope change, and high impact on confidentiality, integrity, and availability. This means an attacker can remotely execute attacks that compromise data confidentiality, alter data integrity, and disrupt service availability, potentially leading to full application takeover. No patches were listed at the time of publication, and no known exploits in the wild have been reported, but the critical severity demands immediate attention from organizations using the affected versions.

Potential Impact

The impact of CVE-2025-50067 is severe for organizations relying on Oracle Application Express, especially versions 24.2.4 and 24.2.5. A successful attack can lead to complete compromise of the Oracle APEX environment, allowing attackers to access sensitive data, modify or delete critical information, and disrupt application availability. The scope change implies that other Oracle products integrated or dependent on APEX could also be affected, potentially amplifying the damage across enterprise systems. This could result in data breaches, loss of customer trust, regulatory penalties, and operational downtime. Given Oracle APEX's widespread use in enterprise web applications and internal business processes, the vulnerability poses a significant risk to sectors such as finance, government, healthcare, and large enterprises globally. The requirement for user interaction means social engineering or phishing campaigns could be used to facilitate exploitation, increasing the attack vector surface. Organizations failing to address this vulnerability promptly may face targeted attacks aiming at data exfiltration, ransomware deployment, or full system takeover.

Mitigation Recommendations

To mitigate CVE-2025-50067, organizations should immediately identify and inventory all Oracle Application Express instances running versions 24.2.4 or 24.2.5. Until official patches are released, implement strict network segmentation to limit HTTP access to trusted users and systems only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests that could exploit URL redirection or similar attack vectors. Educate users about the risks of interacting with unsolicited links or unexpected requests, emphasizing the need for caution to prevent social engineering exploitation. Monitor application logs and network traffic for unusual activities indicative of exploitation attempts. Where possible, disable or restrict the Strategic Planner Starter App component if it is not essential. Prepare for rapid patch deployment by establishing a vulnerability management process that prioritizes this critical issue. After patches are available, apply them promptly and verify the integrity and security of the Oracle APEX environment. Additionally, conduct penetration testing focused on URL redirection and user interaction attack vectors to ensure defenses are effective.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.110Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00aa83201eaacd04431

Added to database: 7/15/2025, 7:46:18 PM

Last enriched: 2/27/2026, 3:08:34 AM

Last updated: 3/23/2026, 4:06:56 PM

Views: 308

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses