CVE-2025-61754: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. in Oracle Corporation Oracle BI Publisher
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Service API). Supported versions that are affected are 7.6.0.0.0 and 8.2.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
AI Analysis
Technical Summary
CVE-2025-61754 is a vulnerability identified in Oracle BI Publisher, specifically affecting versions 7.6.0.0.0 and 8.2.0.0.0 within the Web Service API component. This flaw allows an attacker with low privileges and network access via HTTP to exploit the system without requiring user interaction. The vulnerability is classified under CWE-267, indicating improper access control. Exploitation can result in unauthorized access to sensitive or critical data managed by Oracle BI Publisher, potentially exposing confidential business intelligence reports and analytics data. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) highlights that the attack can be performed remotely over the network with low attack complexity and only requires low privileges, but no user interaction is needed. The impact is primarily on confidentiality, with no direct effects on integrity or availability. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and the critical nature of the data involved make it a significant risk. Oracle has not yet released patches at the time of this report, emphasizing the need for immediate mitigation strategies. The vulnerability's presence in widely used Oracle BI Publisher versions means that many organizations relying on Oracle Analytics for reporting and data visualization could be exposed.
Potential Impact
For European organizations, the impact of CVE-2025-61754 can be substantial due to the sensitive nature of data handled by Oracle BI Publisher, including financial reports, operational analytics, and strategic business intelligence. Unauthorized access could lead to data breaches, loss of competitive advantage, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since the vulnerability allows access without elevating privileges or user interaction, attackers could stealthily extract critical data over the network. This risk is heightened in sectors such as finance, government, healthcare, and telecommunications, where Oracle BI Publisher is commonly deployed. The breach of confidentiality could also facilitate further attacks or insider threats. The absence of integrity or availability impact reduces the risk of data manipulation or service disruption but does not diminish the severity of data exposure. Organizations that have not updated or mitigated this vulnerability face increased risk of targeted attacks, especially in the context of increasing cyber espionage and data theft activities in Europe.
Mitigation Recommendations
1. Immediate network-level controls: Restrict access to Oracle BI Publisher Web Service API endpoints to trusted internal networks and VPNs only, using firewalls and network segmentation. 2. Apply Oracle patches promptly once released; monitor Oracle security advisories for updates related to CVE-2025-61754. 3. Implement strict access controls and least privilege principles for users and service accounts interacting with BI Publisher. 4. Enable detailed logging and monitoring of API access to detect unusual or unauthorized activity early. 5. Use Web Application Firewalls (WAF) to detect and block suspicious HTTP requests targeting the BI Publisher API. 6. Conduct regular security assessments and penetration testing focusing on Oracle BI Publisher deployments. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving BI Publisher data breaches. 8. Consider temporary disabling or isolating vulnerable BI Publisher instances if immediate patching is not feasible. 9. Review and audit all data access permissions within BI Publisher to minimize exposure. 10. Employ network intrusion detection systems (NIDS) tuned to detect exploitation attempts of this vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Switzerland, Ireland
CVE-2025-61754: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. in Oracle Corporation Oracle BI Publisher
Description
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Service API). Supported versions that are affected are 7.6.0.0.0 and 8.2.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-61754 is a vulnerability identified in Oracle BI Publisher, specifically affecting versions 7.6.0.0.0 and 8.2.0.0.0 within the Web Service API component. This flaw allows an attacker with low privileges and network access via HTTP to exploit the system without requiring user interaction. The vulnerability is classified under CWE-267, indicating improper access control. Exploitation can result in unauthorized access to sensitive or critical data managed by Oracle BI Publisher, potentially exposing confidential business intelligence reports and analytics data. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) highlights that the attack can be performed remotely over the network with low attack complexity and only requires low privileges, but no user interaction is needed. The impact is primarily on confidentiality, with no direct effects on integrity or availability. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and the critical nature of the data involved make it a significant risk. Oracle has not yet released patches at the time of this report, emphasizing the need for immediate mitigation strategies. The vulnerability's presence in widely used Oracle BI Publisher versions means that many organizations relying on Oracle Analytics for reporting and data visualization could be exposed.
Potential Impact
For European organizations, the impact of CVE-2025-61754 can be substantial due to the sensitive nature of data handled by Oracle BI Publisher, including financial reports, operational analytics, and strategic business intelligence. Unauthorized access could lead to data breaches, loss of competitive advantage, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since the vulnerability allows access without elevating privileges or user interaction, attackers could stealthily extract critical data over the network. This risk is heightened in sectors such as finance, government, healthcare, and telecommunications, where Oracle BI Publisher is commonly deployed. The breach of confidentiality could also facilitate further attacks or insider threats. The absence of integrity or availability impact reduces the risk of data manipulation or service disruption but does not diminish the severity of data exposure. Organizations that have not updated or mitigated this vulnerability face increased risk of targeted attacks, especially in the context of increasing cyber espionage and data theft activities in Europe.
Mitigation Recommendations
1. Immediate network-level controls: Restrict access to Oracle BI Publisher Web Service API endpoints to trusted internal networks and VPNs only, using firewalls and network segmentation. 2. Apply Oracle patches promptly once released; monitor Oracle security advisories for updates related to CVE-2025-61754. 3. Implement strict access controls and least privilege principles for users and service accounts interacting with BI Publisher. 4. Enable detailed logging and monitoring of API access to detect unusual or unauthorized activity early. 5. Use Web Application Firewalls (WAF) to detect and block suspicious HTTP requests targeting the BI Publisher API. 6. Conduct regular security assessments and penetration testing focusing on Oracle BI Publisher deployments. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving BI Publisher data breaches. 8. Consider temporary disabling or isolating vulnerable BI Publisher instances if immediate patching is not feasible. 9. Review and audit all data access permissions within BI Publisher to minimize exposure. 10. Employ network intrusion detection systems (NIDS) tuned to detect exploitation attempts of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-09-30T19:21:55.556Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7e96f01721c03c6f13e68
Added to database: 10/21/2025, 8:13:35 PM
Last enriched: 10/28/2025, 9:18:53 PM
Last updated: 10/29/2025, 7:03:26 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-7320: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in automattic WooCommerce
MediumCasdoor 2.95.0 - Cross-Site Request Forgery (CSRF)
MediumCVE-2025-9544: CWE-862 Missing Authorization in Doppler Forms
UnknownCVE-2025-49042: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Automattic WooCommerce
MediumHow to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.