Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53043: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Product Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Product Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Product Hub accessible data. in Oracle Corporation Oracle Product Hub

0
High
VulnerabilityCVE-2025-53043cvecve-2025-53043
Published: Tue Oct 21 2025 (10/21/2025, 20:02:55 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Product Hub

Description

Vulnerability in the Oracle Product Hub product of Oracle E-Business Suite (component: Item Catalog). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Product Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Product Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Product Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:27:24 UTC

Technical Analysis

CVE-2025-53043 is a vulnerability identified in the Oracle Product Hub component of Oracle E-Business Suite, specifically affecting versions 12.2.3 through 12.2.14. The flaw allows an attacker with low privileges and network access over HTTP to compromise the Oracle Product Hub system. The vulnerability enables unauthorized creation, deletion, or modification of critical data, effectively granting the attacker the ability to manipulate or access all data accessible via the Oracle Product Hub. The CVSS 3.1 base score of 8.1 reflects high impact on confidentiality and integrity, with an attack vector over the network (AV:N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction needed (UI:N), and unchanged scope (S:U). The vulnerability is categorized under CWE-200, indicating exposure of sensitive information. Although no patches are currently linked, the vulnerability's ease of exploitation and potential for data compromise make it a significant risk for organizations relying on Oracle Product Hub for item catalog and product data management. The absence of known exploits in the wild suggests it is newly disclosed, but the threat landscape may evolve rapidly given the critical nature of the data involved.

Potential Impact

The impact of CVE-2025-53043 is substantial for organizations using Oracle Product Hub, as it allows attackers to gain unauthorized access to sensitive product and item catalog data. This can lead to data integrity issues, including unauthorized creation, modification, or deletion of critical business data, potentially disrupting supply chains, inventory management, and product lifecycle processes. Confidentiality breaches could expose proprietary or sensitive business information, leading to competitive disadvantage or regulatory compliance violations. The vulnerability does not directly impact availability, but data corruption or manipulation could indirectly cause operational disruptions. Given Oracle Product Hub's role in enterprise resource planning and product data management, exploitation could have cascading effects on business operations, financial reporting, and customer trust. Organizations in manufacturing, retail, and distribution sectors are particularly vulnerable due to their reliance on accurate product data. The ease of exploitation over HTTP without user interaction increases the likelihood of attacks, especially in environments with exposed or poorly segmented network access to Oracle E-Business Suite components.

Mitigation Recommendations

To mitigate CVE-2025-53043, organizations should immediately assess their Oracle Product Hub deployments to identify affected versions (12.2.3 through 12.2.14). Although no official patches are currently linked, organizations should monitor Oracle security advisories closely and apply patches as soon as they become available. In the interim, restrict network access to Oracle Product Hub interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting Oracle Product Hub endpoints. Conduct thorough access reviews to ensure that user privileges are minimized according to the principle of least privilege, reducing the risk posed by low-privileged attackers. Enable detailed logging and monitoring of Oracle Product Hub activities to detect anomalous behavior indicative of exploitation attempts. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned for Oracle E-Business Suite traffic. Regularly back up critical data and validate backup integrity to enable recovery in case of data manipulation or corruption. Finally, educate IT and security teams about this vulnerability to ensure rapid response and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-24T16:45:19.420Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96c01721c03c6f13dd3

Added to database: 10/21/2025, 8:13:32 PM

Last enriched: 2/27/2026, 5:27:24 AM

Last updated: 3/25/2026, 12:34:06 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses