CVE-2025-50067: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. in Oracle Corporation Oracle Application Express
Vulnerability in Oracle Application Express (component: Strategic Planner Starter App). Supported versions that are affected are 24.2.4 and 24.2.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
AI Analysis
Technical Summary
CVE-2025-50067 is a critical security vulnerability identified in Oracle Application Express (APEX), specifically within the Strategic Planner Starter App component in versions 24.2.4 and 24.2.5. The vulnerability is classified under CWE-601, which typically relates to URL redirection or forwarding issues, suggesting that it may involve improper handling of URLs leading to security bypass or redirection attacks. This flaw allows a low-privileged attacker with network access via HTTP to exploit the system, but successful exploitation requires user interaction from a third party, such as clicking a malicious link or performing an action initiated by the attacker. The vulnerability's scope is notable because while it resides in Oracle Application Express, exploitation can impact additional Oracle products, indicating a scope change that broadens the attack surface. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network attack vector, low attack complexity, low privileges required, user interaction required, scope change, and high impact on confidentiality, integrity, and availability. This means an attacker can remotely execute attacks that compromise data confidentiality, alter data integrity, and disrupt service availability, potentially leading to full application takeover. No patches were listed at the time of publication, and no known exploits in the wild have been reported, but the critical severity demands immediate attention from organizations using the affected versions.
Potential Impact
The impact of CVE-2025-50067 is severe for organizations relying on Oracle Application Express, especially versions 24.2.4 and 24.2.5. A successful attack can lead to complete compromise of the Oracle APEX environment, allowing attackers to access sensitive data, modify or delete critical information, and disrupt application availability. The scope change implies that other Oracle products integrated or dependent on APEX could also be affected, potentially amplifying the damage across enterprise systems. This could result in data breaches, loss of customer trust, regulatory penalties, and operational downtime. Given Oracle APEX's widespread use in enterprise web applications and internal business processes, the vulnerability poses a significant risk to sectors such as finance, government, healthcare, and large enterprises globally. The requirement for user interaction means social engineering or phishing campaigns could be used to facilitate exploitation, increasing the attack vector surface. Organizations failing to address this vulnerability promptly may face targeted attacks aiming at data exfiltration, ransomware deployment, or full system takeover.
Mitigation Recommendations
To mitigate CVE-2025-50067, organizations should immediately identify and inventory all Oracle Application Express instances running versions 24.2.4 or 24.2.5. Until official patches are released, implement strict network segmentation to limit HTTP access to trusted users and systems only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests that could exploit URL redirection or similar attack vectors. Educate users about the risks of interacting with unsolicited links or unexpected requests, emphasizing the need for caution to prevent social engineering exploitation. Monitor application logs and network traffic for unusual activities indicative of exploitation attempts. Where possible, disable or restrict the Strategic Planner Starter App component if it is not essential. Prepare for rapid patch deployment by establishing a vulnerability management process that prioritizes this critical issue. After patches are available, apply them promptly and verify the integrity and security of the Oracle APEX environment. Additionally, conduct penetration testing focused on URL redirection and user interaction attack vectors to ensure defenses are effective.
Affected Countries
United States, India, United Kingdom, Germany, Japan, Australia, Canada, France, Brazil, South Korea, Netherlands, Singapore
CVE-2025-50067: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. in Oracle Corporation Oracle Application Express
Description
Vulnerability in Oracle Application Express (component: Strategic Planner Starter App). Supported versions that are affected are 24.2.4 and 24.2.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Application Express. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-50067 is a critical security vulnerability identified in Oracle Application Express (APEX), specifically within the Strategic Planner Starter App component in versions 24.2.4 and 24.2.5. The vulnerability is classified under CWE-601, which typically relates to URL redirection or forwarding issues, suggesting that it may involve improper handling of URLs leading to security bypass or redirection attacks. This flaw allows a low-privileged attacker with network access via HTTP to exploit the system, but successful exploitation requires user interaction from a third party, such as clicking a malicious link or performing an action initiated by the attacker. The vulnerability's scope is notable because while it resides in Oracle Application Express, exploitation can impact additional Oracle products, indicating a scope change that broadens the attack surface. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network attack vector, low attack complexity, low privileges required, user interaction required, scope change, and high impact on confidentiality, integrity, and availability. This means an attacker can remotely execute attacks that compromise data confidentiality, alter data integrity, and disrupt service availability, potentially leading to full application takeover. No patches were listed at the time of publication, and no known exploits in the wild have been reported, but the critical severity demands immediate attention from organizations using the affected versions.
Potential Impact
The impact of CVE-2025-50067 is severe for organizations relying on Oracle Application Express, especially versions 24.2.4 and 24.2.5. A successful attack can lead to complete compromise of the Oracle APEX environment, allowing attackers to access sensitive data, modify or delete critical information, and disrupt application availability. The scope change implies that other Oracle products integrated or dependent on APEX could also be affected, potentially amplifying the damage across enterprise systems. This could result in data breaches, loss of customer trust, regulatory penalties, and operational downtime. Given Oracle APEX's widespread use in enterprise web applications and internal business processes, the vulnerability poses a significant risk to sectors such as finance, government, healthcare, and large enterprises globally. The requirement for user interaction means social engineering or phishing campaigns could be used to facilitate exploitation, increasing the attack vector surface. Organizations failing to address this vulnerability promptly may face targeted attacks aiming at data exfiltration, ransomware deployment, or full system takeover.
Mitigation Recommendations
To mitigate CVE-2025-50067, organizations should immediately identify and inventory all Oracle Application Express instances running versions 24.2.4 or 24.2.5. Until official patches are released, implement strict network segmentation to limit HTTP access to trusted users and systems only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests that could exploit URL redirection or similar attack vectors. Educate users about the risks of interacting with unsolicited links or unexpected requests, emphasizing the need for caution to prevent social engineering exploitation. Monitor application logs and network traffic for unusual activities indicative of exploitation attempts. Where possible, disable or restrict the Strategic Planner Starter App component if it is not essential. Prepare for rapid patch deployment by establishing a vulnerability management process that prioritizes this critical issue. After patches are available, apply them promptly and verify the integrity and security of the Oracle APEX environment. Additionally, conduct penetration testing focused on URL redirection and user interaction attack vectors to ensure defenses are effective.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.110Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00aa83201eaacd04431
Added to database: 7/15/2025, 7:46:18 PM
Last enriched: 2/27/2026, 3:08:34 AM
Last updated: 3/23/2026, 4:06:56 PM
Views: 308
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.