CVE-2025-50090: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. in Oracle Corporation Oracle Applications Framework
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Personalization). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2025-50090 is a vulnerability identified in the Oracle Applications Framework component of the Oracle E-Business Suite, specifically affecting versions 12.2.3 through 12.2.14. This vulnerability is classified under CWE-352, which relates to Cross-Site Request Forgery (CSRF). The flaw allows a low-privileged attacker with network access via HTTP to exploit the system, but successful exploitation requires user interaction from a person other than the attacker, indicating a social engineering or phishing vector. The vulnerability enables unauthorized update, insert, or delete operations on accessible data within the Oracle Applications Framework, as well as unauthorized read access to a subset of this data. The scope of impact extends beyond the Oracle Applications Framework itself, potentially affecting additional Oracle products integrated with or dependent on this framework, indicating a scope change. The CVSS 3.1 base score is 5.4, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope change (S:C), and limited confidentiality and integrity impacts (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability’s reliance on user interaction and low privilege requirements make it a notable risk, especially in environments where Oracle E-Business Suite is widely used and users may be susceptible to social engineering. The vulnerability’s ability to modify and read sensitive data could lead to data integrity issues and unauthorized data disclosure within enterprise systems.
Potential Impact
For European organizations, the impact of CVE-2025-50090 could be significant, particularly for those relying on Oracle E-Business Suite for critical business processes such as finance, supply chain, and human resources. Unauthorized data manipulation (update, insert, delete) could disrupt business operations, corrupt financial records, or alter transactional data, leading to compliance violations under regulations like GDPR. Unauthorized read access could expose sensitive personal or corporate data, increasing the risk of data breaches and associated reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, which is a common attack vector in Europe. The scope change implies that integrated Oracle products could also be compromised, broadening the attack surface and potential impact. Given the widespread use of Oracle E-Business Suite in large enterprises and government agencies across Europe, exploitation could affect critical infrastructure and services, potentially causing operational disruptions and financial losses.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic patching advice. First, they should prioritize deploying any available patches or security updates from Oracle as soon as they are released. Until patches are available, organizations should enforce strict network segmentation and access controls to limit HTTP access to Oracle Applications Framework interfaces only to trusted internal users and systems. Implement multi-factor authentication (MFA) for all users accessing Oracle E-Business Suite to reduce the risk posed by compromised credentials. Conduct user awareness training focused on recognizing and avoiding phishing and social engineering attacks, as user interaction is required for exploitation. Monitor logs and network traffic for unusual activity related to Oracle Applications Framework, such as unexpected data modification requests or access patterns. Employ web application firewalls (WAFs) with custom rules to detect and block CSRF attempts and anomalous HTTP requests targeting Oracle applications. Finally, review and tighten personalization and customization settings within Oracle Applications Framework to minimize unnecessary privileges and exposure of sensitive data.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-50090: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. in Oracle Corporation Oracle Applications Framework
Description
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Personalization). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-50090 is a vulnerability identified in the Oracle Applications Framework component of the Oracle E-Business Suite, specifically affecting versions 12.2.3 through 12.2.14. This vulnerability is classified under CWE-352, which relates to Cross-Site Request Forgery (CSRF). The flaw allows a low-privileged attacker with network access via HTTP to exploit the system, but successful exploitation requires user interaction from a person other than the attacker, indicating a social engineering or phishing vector. The vulnerability enables unauthorized update, insert, or delete operations on accessible data within the Oracle Applications Framework, as well as unauthorized read access to a subset of this data. The scope of impact extends beyond the Oracle Applications Framework itself, potentially affecting additional Oracle products integrated with or dependent on this framework, indicating a scope change. The CVSS 3.1 base score is 5.4, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), user interaction (UI:R), scope change (S:C), and limited confidentiality and integrity impacts (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability’s reliance on user interaction and low privilege requirements make it a notable risk, especially in environments where Oracle E-Business Suite is widely used and users may be susceptible to social engineering. The vulnerability’s ability to modify and read sensitive data could lead to data integrity issues and unauthorized data disclosure within enterprise systems.
Potential Impact
For European organizations, the impact of CVE-2025-50090 could be significant, particularly for those relying on Oracle E-Business Suite for critical business processes such as finance, supply chain, and human resources. Unauthorized data manipulation (update, insert, delete) could disrupt business operations, corrupt financial records, or alter transactional data, leading to compliance violations under regulations like GDPR. Unauthorized read access could expose sensitive personal or corporate data, increasing the risk of data breaches and associated reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, which is a common attack vector in Europe. The scope change implies that integrated Oracle products could also be compromised, broadening the attack surface and potential impact. Given the widespread use of Oracle E-Business Suite in large enterprises and government agencies across Europe, exploitation could affect critical infrastructure and services, potentially causing operational disruptions and financial losses.
Mitigation Recommendations
European organizations should implement targeted mitigation strategies beyond generic patching advice. First, they should prioritize deploying any available patches or security updates from Oracle as soon as they are released. Until patches are available, organizations should enforce strict network segmentation and access controls to limit HTTP access to Oracle Applications Framework interfaces only to trusted internal users and systems. Implement multi-factor authentication (MFA) for all users accessing Oracle E-Business Suite to reduce the risk posed by compromised credentials. Conduct user awareness training focused on recognizing and avoiding phishing and social engineering attacks, as user interaction is required for exploitation. Monitor logs and network traffic for unusual activity related to Oracle Applications Framework, such as unexpected data modification requests or access patterns. Employ web application firewalls (WAFs) with custom rules to detect and block CSRF attempts and anomalous HTTP requests targeting Oracle applications. Finally, review and tighten personalization and customization settings within Oracle Applications Framework to minimize unnecessary privileges and exposure of sensitive data.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.112Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00ba83201eaacd04484
Added to database: 7/15/2025, 7:46:19 PM
Last enriched: 7/22/2025, 8:47:09 PM
Last updated: 1/7/2026, 8:47:59 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.