Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61748: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Oracle Java SE

0
Low
VulnerabilityCVE-2025-61748cvecve-2025-61748
Published: Tue Oct 21 2025 (10/21/2025, 20:03:08 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Java SE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 21.0.8 and 25; Oracle GraalVM for JDK: 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

AI-Powered Analysis

AILast updated: 10/28/2025, 21:17:55 UTC

Technical Analysis

CVE-2025-61748 is a vulnerability identified in Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition, specifically impacting versions 21.0.8 and 25 for Java SE, 21.0.8 for GraalVM for JDK, and 21.3.15 for GraalVM Enterprise Edition. The flaw resides in the Libraries component and can be exploited remotely by an unauthenticated attacker with network access via multiple protocols. The attack vector involves leveraging APIs exposed by the affected components, such as web services that supply data to these APIs. The vulnerability allows unauthorized modification actions—update, insert, or delete—on data accessible through these APIs. This is particularly relevant for Java deployments running sandboxed Java Web Start applications or sandboxed Java applets that load untrusted code from the internet and rely on the Java sandbox for security. The vulnerability does not affect confidentiality or availability but impacts data integrity. Exploitation is considered difficult due to high attack complexity, and no privileges or user interaction are required. The CVSS 3.1 base score is 3.7, reflecting a low severity primarily due to the limited impact and exploitation difficulty. No public exploits or active exploitation in the wild have been reported. The underlying weakness aligns with CWE-284 (Improper Access Control), indicating insufficient enforcement of access controls on the affected APIs.

Potential Impact

For European organizations, the primary impact of CVE-2025-61748 lies in the potential unauthorized modification of data within Oracle Java SE and GraalVM environments. This could affect applications relying on these Java runtimes, especially those exposing APIs or running sandboxed Java Web Start applications or applets that process untrusted code. While confidentiality and availability remain intact, integrity breaches could lead to data corruption, unauthorized transactions, or manipulation of application state, potentially undermining trust in critical business processes. Organizations in sectors such as finance, government, and critical infrastructure that use Oracle Java technologies extensively may face risks of data tampering. However, the difficulty of exploitation and lack of known active exploits reduce immediate threat levels. Still, the presence of network access as an attack vector means that exposed services or APIs could be targeted if not properly secured. The impact is more pronounced in environments where Java applications handle sensitive or regulated data and where integrity is paramount for compliance and operational reliability.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Identify and inventory all Oracle Java SE and GraalVM deployments, focusing on versions 21.0.8 and 25 for Java SE and corresponding GraalVM versions. 2) Restrict network access to APIs exposed by these Java runtimes, especially those accessible over multiple protocols, using network segmentation, firewalls, and access control lists to limit exposure. 3) Apply strict input validation and enforce robust access controls on APIs to prevent unauthorized data modification. 4) Where possible, disable or limit the use of Java Web Start applications and sandboxed applets that load untrusted code, or migrate to more secure deployment models. 5) Monitor logs and network traffic for unusual update, insert, or delete operations on Java-accessible data stores. 6) Stay updated with Oracle security advisories for patches or workarounds, and plan timely patching once available. 7) Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect anomalous behavior related to Java processes. 8) Educate developers and administrators about the risks of loading untrusted code in Java sandboxes and encourage secure coding practices to minimize attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.554Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e4c

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 10/28/2025, 9:17:55 PM

Last updated: 10/29/2025, 8:18:24 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats