CVE-2025-61757: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. in Oracle Corporation Identity Manager
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
AI Analysis
Technical Summary
CVE-2025-61757 is a critical security vulnerability identified in Oracle Corporation's Identity Manager product, specifically affecting versions 12.2.1.4.0 and 14.1.2.1.0. The vulnerability exists in the REST WebServices component of Oracle Fusion Middleware. It allows an unauthenticated attacker with network access over HTTP to exploit the system without any prerequisites such as authentication or user interaction. The root cause is linked to CWE-306, indicating missing or insufficient authentication controls. Due to this flaw, an attacker can fully compromise the Identity Manager, resulting in complete takeover of the system. The CVSS 3.1 base score of 9.8 reflects the highest severity, with impacts across confidentiality, integrity, and availability. This means attackers can exfiltrate sensitive identity data, alter or delete identity information, and disrupt identity management services. The vulnerability is easily exploitable remotely, increasing the risk of rapid exploitation in unpatched environments. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high-priority threat. Oracle has not yet published patches, so organizations must monitor for updates and apply them promptly once available. The vulnerability poses a significant risk to enterprise environments relying on Oracle Identity Manager for identity governance and administration, potentially enabling attackers to escalate privileges and move laterally within networks.
Potential Impact
For European organizations, the impact of CVE-2025-61757 is profound. Oracle Identity Manager is widely used in large enterprises and government agencies for identity governance, access management, and compliance. A successful attack could lead to unauthorized access to sensitive personal and corporate identity data, violating GDPR and other data protection regulations. The compromise of Identity Manager could allow attackers to manipulate user permissions, create backdoors, and disrupt authentication workflows, leading to broader network compromise and operational disruption. Critical sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on robust identity management. The availability impact could result in denial of identity services, affecting business continuity. The confidentiality breach could expose personal data of EU citizens, triggering regulatory penalties and reputational damage. Given the unauthenticated and network-accessible nature of the vulnerability, attackers could exploit it remotely, increasing the threat surface for European organizations with internet-facing Oracle Identity Manager instances.
Mitigation Recommendations
Immediate mitigation steps include: 1) Implement strict network segmentation and firewall rules to restrict access to Oracle Identity Manager REST WebServices only to trusted internal networks and management stations. 2) Monitor network traffic for unusual HTTP requests targeting Identity Manager endpoints to detect potential exploitation attempts. 3) Apply Oracle's security advisories and patches as soon as they are released; prioritize patching affected versions 12.2.1.4.0 and 14.1.2.1.0. 4) Employ Web Application Firewalls (WAFs) with custom rules to block suspicious unauthenticated HTTP requests to Identity Manager. 5) Conduct thorough audits of Identity Manager logs and configurations to identify any signs of compromise or unauthorized changes. 6) Enforce multi-factor authentication and least privilege principles for administrative access to Identity Manager to reduce impact if compromise occurs. 7) Establish incident response plans specific to identity management compromise scenarios. 8) Engage with Oracle support and subscribe to their security bulletins for timely updates. These targeted actions go beyond generic advice by focusing on access control, monitoring, and rapid patch deployment tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-61757: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. in Oracle Corporation Identity Manager
Description
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
AI-Powered Analysis
Technical Analysis
CVE-2025-61757 is a critical security vulnerability identified in Oracle Corporation's Identity Manager product, specifically affecting versions 12.2.1.4.0 and 14.1.2.1.0. The vulnerability exists in the REST WebServices component of Oracle Fusion Middleware. It allows an unauthenticated attacker with network access over HTTP to exploit the system without any prerequisites such as authentication or user interaction. The root cause is linked to CWE-306, indicating missing or insufficient authentication controls. Due to this flaw, an attacker can fully compromise the Identity Manager, resulting in complete takeover of the system. The CVSS 3.1 base score of 9.8 reflects the highest severity, with impacts across confidentiality, integrity, and availability. This means attackers can exfiltrate sensitive identity data, alter or delete identity information, and disrupt identity management services. The vulnerability is easily exploitable remotely, increasing the risk of rapid exploitation in unpatched environments. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high-priority threat. Oracle has not yet published patches, so organizations must monitor for updates and apply them promptly once available. The vulnerability poses a significant risk to enterprise environments relying on Oracle Identity Manager for identity governance and administration, potentially enabling attackers to escalate privileges and move laterally within networks.
Potential Impact
For European organizations, the impact of CVE-2025-61757 is profound. Oracle Identity Manager is widely used in large enterprises and government agencies for identity governance, access management, and compliance. A successful attack could lead to unauthorized access to sensitive personal and corporate identity data, violating GDPR and other data protection regulations. The compromise of Identity Manager could allow attackers to manipulate user permissions, create backdoors, and disrupt authentication workflows, leading to broader network compromise and operational disruption. Critical sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on robust identity management. The availability impact could result in denial of identity services, affecting business continuity. The confidentiality breach could expose personal data of EU citizens, triggering regulatory penalties and reputational damage. Given the unauthenticated and network-accessible nature of the vulnerability, attackers could exploit it remotely, increasing the threat surface for European organizations with internet-facing Oracle Identity Manager instances.
Mitigation Recommendations
Immediate mitigation steps include: 1) Implement strict network segmentation and firewall rules to restrict access to Oracle Identity Manager REST WebServices only to trusted internal networks and management stations. 2) Monitor network traffic for unusual HTTP requests targeting Identity Manager endpoints to detect potential exploitation attempts. 3) Apply Oracle's security advisories and patches as soon as they are released; prioritize patching affected versions 12.2.1.4.0 and 14.1.2.1.0. 4) Employ Web Application Firewalls (WAFs) with custom rules to block suspicious unauthenticated HTTP requests to Identity Manager. 5) Conduct thorough audits of Identity Manager logs and configurations to identify any signs of compromise or unauthorized changes. 6) Enforce multi-factor authentication and least privilege principles for administrative access to Identity Manager to reduce impact if compromise occurs. 7) Establish incident response plans specific to identity management compromise scenarios. 8) Engage with Oracle support and subscribe to their security bulletins for timely updates. These targeted actions go beyond generic advice by focusing on access control, monitoring, and rapid patch deployment tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-09-30T19:21:55.556Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7e96f01721c03c6f13e6e
Added to database: 10/21/2025, 8:13:35 PM
Last enriched: 11/27/2025, 3:30:21 AM
Last updated: 12/6/2025, 10:24:20 AM
Views: 979
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14126: Hard-coded Credentials in TOZED ZLT M30S
HighCVE-2025-13065: CWE-434 Unrestricted Upload of File with Dangerous Type in brainstormforce Starter Templates – AI-Powered Templates for Elementor & Gutenberg
HighCVE-2025-12966: CWE-434 Unrestricted Upload of File with Dangerous Type in plugins360 All-in-One Video Gallery
HighCVE-2025-12499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in widgetpack Rich Shortcodes for Google Reviews
HighCVE-2025-13748: CWE-639 Authorization Bypass Through User-Controlled Key in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.