CVE-2025-61755: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. in Oracle Corporation Oracle GraalVM for JDK
Vulnerability in the Oracle GraalVM for JDK product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.16 and 21.0.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
AI Analysis
Technical Summary
CVE-2025-61755 is a vulnerability identified in Oracle GraalVM for JDK, specifically affecting versions 17.0.16 and 21.0.8. The flaw resides in the compiler component of the product and allows an unauthenticated attacker with network access via multiple protocols to compromise the system. The exploitation is considered difficult due to the high attack complexity, and no user interaction or privileges are required. Successful exploitation results in unauthorized read access to a subset of data accessible through Oracle GraalVM for JDK, impacting confidentiality but not integrity or availability. The CVSS 3.1 base score is 3.7, reflecting a low severity primarily due to limited confidentiality impact and the difficulty of exploitation. The vulnerability does not allow code execution or denial of service, and no known exploits have been reported in the wild as of the publication date. The CWE classification is CWE-862, indicating improper authorization. No patches were linked at the time of disclosure, suggesting that Oracle may be preparing updates or that mitigations are currently limited to access controls and network restrictions.
Potential Impact
For European organizations, the primary impact of CVE-2025-61755 is the potential unauthorized disclosure of sensitive data accessible via Oracle GraalVM for JDK. While the scope of data exposure is limited and does not include modification or disruption, any leakage of confidential information can have regulatory and reputational consequences, especially under GDPR. Organizations running affected versions in network-exposed environments risk attackers gaining read access to internal data subsets. This could be leveraged for further reconnaissance or combined with other vulnerabilities for more severe attacks. The difficulty of exploitation reduces immediate risk, but the presence of this vulnerability in critical Java runtime environments used in enterprise applications means that high-value targets such as financial institutions, government agencies, and technology firms could be affected. The lack of known exploits lowers urgency but does not eliminate the need for vigilance.
Mitigation Recommendations
European organizations should proactively monitor Oracle's security advisories for patches addressing CVE-2025-61755 and plan timely upgrades to fixed versions once available. Until patches are released, network segmentation and strict access controls should be enforced to limit exposure of Oracle GraalVM services to untrusted networks. Employing firewall rules to restrict inbound traffic to trusted hosts and protocols can reduce attack surface. Additionally, organizations should audit their use of GraalVM for JDK to identify and isolate instances running affected versions. Implementing network intrusion detection systems tuned to detect anomalous access patterns to GraalVM services may provide early warning. Finally, integrating this vulnerability into vulnerability management and risk assessment workflows ensures ongoing awareness and prioritization.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-61755: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. in Oracle Corporation Oracle GraalVM for JDK
Description
Vulnerability in the Oracle GraalVM for JDK product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.16 and 21.0.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-61755 is a vulnerability identified in Oracle GraalVM for JDK, specifically affecting versions 17.0.16 and 21.0.8. The flaw resides in the compiler component of the product and allows an unauthenticated attacker with network access via multiple protocols to compromise the system. The exploitation is considered difficult due to the high attack complexity, and no user interaction or privileges are required. Successful exploitation results in unauthorized read access to a subset of data accessible through Oracle GraalVM for JDK, impacting confidentiality but not integrity or availability. The CVSS 3.1 base score is 3.7, reflecting a low severity primarily due to limited confidentiality impact and the difficulty of exploitation. The vulnerability does not allow code execution or denial of service, and no known exploits have been reported in the wild as of the publication date. The CWE classification is CWE-862, indicating improper authorization. No patches were linked at the time of disclosure, suggesting that Oracle may be preparing updates or that mitigations are currently limited to access controls and network restrictions.
Potential Impact
For European organizations, the primary impact of CVE-2025-61755 is the potential unauthorized disclosure of sensitive data accessible via Oracle GraalVM for JDK. While the scope of data exposure is limited and does not include modification or disruption, any leakage of confidential information can have regulatory and reputational consequences, especially under GDPR. Organizations running affected versions in network-exposed environments risk attackers gaining read access to internal data subsets. This could be leveraged for further reconnaissance or combined with other vulnerabilities for more severe attacks. The difficulty of exploitation reduces immediate risk, but the presence of this vulnerability in critical Java runtime environments used in enterprise applications means that high-value targets such as financial institutions, government agencies, and technology firms could be affected. The lack of known exploits lowers urgency but does not eliminate the need for vigilance.
Mitigation Recommendations
European organizations should proactively monitor Oracle's security advisories for patches addressing CVE-2025-61755 and plan timely upgrades to fixed versions once available. Until patches are released, network segmentation and strict access controls should be enforced to limit exposure of Oracle GraalVM services to untrusted networks. Employing firewall rules to restrict inbound traffic to trusted hosts and protocols can reduce attack surface. Additionally, organizations should audit their use of GraalVM for JDK to identify and isolate instances running affected versions. Implementing network intrusion detection systems tuned to detect anomalous access patterns to GraalVM services may provide early warning. Finally, integrating this vulnerability into vulnerability management and risk assessment workflows ensures ongoing awareness and prioritization.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-09-30T19:21:55.556Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7e96f01721c03c6f13e6b
Added to database: 10/21/2025, 8:13:35 PM
Last enriched: 10/28/2025, 9:59:07 PM
Last updated: 10/29/2025, 1:10:44 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11632: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
MediumCVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
MediumCVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
MediumCVE-2024-52316: CWE-391 Unchecked Error Condition in Apache Software Foundation Apache Tomcat
CriticalCVE-2024-50379: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Apache Software Foundation Apache Tomcat
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.