Skip to main content

CVE-2025-50090: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. in Oracle Corporation Oracle Applications Framework

Medium
VulnerabilityCVE-2025-50090cvecve-2025-50090
Published: Tue Jul 15 2025 (07/15/2025, 19:27:45 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Applications Framework

Description

Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Personalization). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:47:09 UTC

Technical Analysis

CVE-2025-50090 is a vulnerability identified in the Oracle Applications Framework component of the Oracle E-Business Suite, specifically affecting versions 12.2.3 through 12.2.14. This vulnerability is classified under CWE-352, which relates to Cross-Site Request Forgery (CSRF). The flaw allows a low-privileged attacker with network access via HTTP to exploit the system, but successful exploitation requires user interaction from a person other than the attacker, indicating a social engineering or phishing vector. The vulnerability enables unauthorized update, insert, or delete operations on accessible data within the Oracle Applications Framework, as well as unauthorized read access to a subset of this data. The scope of impact extends beyond the Oracle Applications Framework itself, potentially affecting additional Oracle products integrated with or dependent on this framework, indicating a scope change. The CVSS 3.1 base score is 5.4, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope change (S:C), and limited confidentiality and integrity impacts (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability’s reliance on user interaction and low privilege requirements make it a notable risk, especially in environments where Oracle E-Business Suite is widely used and users may be susceptible to social engineering. The vulnerability’s ability to modify and read sensitive data could lead to data integrity issues and unauthorized data disclosure within enterprise systems.

Potential Impact

For European organizations, the impact of CVE-2025-50090 could be significant, particularly for those relying on Oracle E-Business Suite for critical business processes such as finance, supply chain, and human resources. Unauthorized data manipulation (update, insert, delete) could disrupt business operations, corrupt financial records, or alter transactional data, leading to compliance violations under regulations like GDPR. Unauthorized read access could expose sensitive personal or corporate data, increasing the risk of data breaches and associated reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, which is a common attack vector in Europe. The scope change implies that integrated Oracle products could also be compromised, broadening the attack surface and potential impact. Given the widespread use of Oracle E-Business Suite in large enterprises and government agencies across Europe, exploitation could affect critical infrastructure and services, potentially causing operational disruptions and financial losses.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic patching advice. First, they should prioritize deploying any available patches or security updates from Oracle as soon as they are released. Until patches are available, organizations should enforce strict network segmentation and access controls to limit HTTP access to Oracle Applications Framework interfaces only to trusted internal users and systems. Implement multi-factor authentication (MFA) for all users accessing Oracle E-Business Suite to reduce the risk posed by compromised credentials. Conduct user awareness training focused on recognizing and avoiding phishing and social engineering attacks, as user interaction is required for exploitation. Monitor logs and network traffic for unusual activity related to Oracle Applications Framework, such as unexpected data modification requests or access patterns. Employ web application firewalls (WAFs) with custom rules to detect and block CSRF attempts and anomalous HTTP requests targeting Oracle applications. Finally, review and tighten personalization and customization settings within Oracle Applications Framework to minimize unnecessary privileges and exposure of sensitive data.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.112Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00ba83201eaacd04484

Added to database: 7/15/2025, 7:46:19 PM

Last enriched: 7/22/2025, 8:47:09 PM

Last updated: 8/15/2025, 10:53:19 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats