CVE-2025-50105: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Universal Work Queue accessible data as well as unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data. in Oracle Corporation Oracle Universal Work Queue
Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Universal Work Queue accessible data as well as unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI Analysis
Technical Summary
CVE-2025-50105 is a high-severity vulnerability affecting Oracle Universal Work Queue, a component of the Oracle E-Business Suite specifically within the Work Provider Administration module. The vulnerability impacts supported versions from 12.2.3 through 12.2.14. It allows a low-privileged attacker with network access over HTTP to exploit the system without requiring user interaction. The attacker must have some level of privileges (PR:L) but can leverage this flaw remotely (AV:N) with low attack complexity (AC:L). Successful exploitation can lead to unauthorized creation, deletion, or modification of critical data within Oracle Universal Work Queue or even full access to all data accessible by the component. The vulnerability is classified under CWE-284, indicating an improper access control issue. The CVSS 3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, but no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk because it can be exploited remotely over HTTP, potentially allowing attackers to manipulate sensitive business process data managed by Oracle Universal Work Queue, which is often integral to enterprise workflows and operations.
Potential Impact
For European organizations, the impact of CVE-2025-50105 can be substantial. Oracle E-Business Suite is widely used across various industries including finance, manufacturing, retail, and public sector entities in Europe. Compromise of Oracle Universal Work Queue could lead to unauthorized manipulation of critical workflow data, potentially disrupting business processes, causing data integrity issues, and exposing sensitive operational information. This could result in financial losses, regulatory non-compliance (especially under GDPR due to unauthorized data access), reputational damage, and operational downtime. Since the vulnerability allows modification and unauthorized access without user interaction, attackers could stealthily alter or exfiltrate data, complicating detection and response. The lack of availability impact reduces the chance of immediate service outages but increases the risk of persistent data corruption or unauthorized data disclosure. Organizations relying on Oracle E-Business Suite for critical business functions must consider this vulnerability a serious threat to their data security and operational integrity.
Mitigation Recommendations
1. Immediate assessment and inventory: Identify all Oracle E-Business Suite installations using Universal Work Queue versions 12.2.3 through 12.2.14. 2. Network segmentation: Restrict HTTP access to Oracle Universal Work Queue components to trusted internal networks or VPNs only, minimizing exposure to untrusted networks. 3. Access control review: Enforce strict least privilege policies for users with access to Oracle Universal Work Queue, ensuring no unnecessary privileges are granted. 4. Monitor network traffic: Implement anomaly detection to identify unusual HTTP requests targeting Oracle Universal Work Queue endpoints. 5. Apply vendor patches promptly: Although no patches are currently linked, monitor Oracle security advisories closely and apply updates as soon as they are released. 6. Implement Web Application Firewalls (WAFs): Configure WAFs to detect and block suspicious HTTP requests targeting Oracle Universal Work Queue. 7. Conduct regular security audits and penetration tests focusing on Oracle E-Business Suite components to detect potential exploitation attempts. 8. Incident response readiness: Prepare to investigate and remediate potential breaches involving Oracle Universal Work Queue data, including forensic analysis and data integrity verification.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-50105: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Universal Work Queue accessible data as well as unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data. in Oracle Corporation Oracle Universal Work Queue
Description
Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Work Provider Administration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Universal Work Queue accessible data as well as unauthorized access to critical data or complete access to all Oracle Universal Work Queue accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-50105 is a high-severity vulnerability affecting Oracle Universal Work Queue, a component of the Oracle E-Business Suite specifically within the Work Provider Administration module. The vulnerability impacts supported versions from 12.2.3 through 12.2.14. It allows a low-privileged attacker with network access over HTTP to exploit the system without requiring user interaction. The attacker must have some level of privileges (PR:L) but can leverage this flaw remotely (AV:N) with low attack complexity (AC:L). Successful exploitation can lead to unauthorized creation, deletion, or modification of critical data within Oracle Universal Work Queue or even full access to all data accessible by the component. The vulnerability is classified under CWE-284, indicating an improper access control issue. The CVSS 3.1 base score is 8.1, reflecting high impact on confidentiality and integrity, but no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability poses a significant risk because it can be exploited remotely over HTTP, potentially allowing attackers to manipulate sensitive business process data managed by Oracle Universal Work Queue, which is often integral to enterprise workflows and operations.
Potential Impact
For European organizations, the impact of CVE-2025-50105 can be substantial. Oracle E-Business Suite is widely used across various industries including finance, manufacturing, retail, and public sector entities in Europe. Compromise of Oracle Universal Work Queue could lead to unauthorized manipulation of critical workflow data, potentially disrupting business processes, causing data integrity issues, and exposing sensitive operational information. This could result in financial losses, regulatory non-compliance (especially under GDPR due to unauthorized data access), reputational damage, and operational downtime. Since the vulnerability allows modification and unauthorized access without user interaction, attackers could stealthily alter or exfiltrate data, complicating detection and response. The lack of availability impact reduces the chance of immediate service outages but increases the risk of persistent data corruption or unauthorized data disclosure. Organizations relying on Oracle E-Business Suite for critical business functions must consider this vulnerability a serious threat to their data security and operational integrity.
Mitigation Recommendations
1. Immediate assessment and inventory: Identify all Oracle E-Business Suite installations using Universal Work Queue versions 12.2.3 through 12.2.14. 2. Network segmentation: Restrict HTTP access to Oracle Universal Work Queue components to trusted internal networks or VPNs only, minimizing exposure to untrusted networks. 3. Access control review: Enforce strict least privilege policies for users with access to Oracle Universal Work Queue, ensuring no unnecessary privileges are granted. 4. Monitor network traffic: Implement anomaly detection to identify unusual HTTP requests targeting Oracle Universal Work Queue endpoints. 5. Apply vendor patches promptly: Although no patches are currently linked, monitor Oracle security advisories closely and apply updates as soon as they are released. 6. Implement Web Application Firewalls (WAFs): Configure WAFs to detect and block suspicious HTTP requests targeting Oracle Universal Work Queue. 7. Conduct regular security audits and penetration tests focusing on Oracle E-Business Suite components to detect potential exploitation attempts. 8. Incident response readiness: Prepare to investigate and remediate potential breaches involving Oracle Universal Work Queue data, including forensic analysis and data integrity verification.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.114Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00ca83201eaacd044c5
Added to database: 7/15/2025, 7:46:20 PM
Last enriched: 7/22/2025, 8:40:16 PM
Last updated: 8/4/2025, 9:40:59 PM
Views: 8
Related Threats
CVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowCVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.