Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61763: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Essbase accessible data as well as unauthorized access to critical data or complete access to all Oracle Essbase accessible data. in Oracle Corporation Oracle Essbase

0
High
VulnerabilityCVE-2025-61763cvecve-2025-61763
Published: Tue Oct 21 2025 (10/21/2025, 20:03:13 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Essbase

Description

Vulnerability in Oracle Essbase (component: Essbase Web Platform). The supported version that is affected is 21.7.3.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Essbase accessible data as well as unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

AI-Powered Analysis

AILast updated: 10/28/2025, 20:29:38 UTC

Technical Analysis

CVE-2025-61763 is a vulnerability identified in Oracle Essbase version 21.7.3.0.0, specifically within the Essbase Web Platform component. This vulnerability allows an attacker with low privileges and network access via HTTP to compromise the system without requiring user interaction. The attacker can perform unauthorized creation, deletion, or modification of critical data stored or accessible through Oracle Essbase. The vulnerability stems from improper access control (CWE-284), enabling privilege escalation or unauthorized data manipulation. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) indicates that the attack can be launched remotely over the network with low attack complexity and requires only low privileges but no user interaction. The impact is high on confidentiality and integrity, as attackers can access or alter sensitive financial or business intelligence data, but availability is not affected. No known exploits are currently in the wild, and no official patches have been published at the time of disclosure. Oracle Essbase is widely used for enterprise performance management and financial analytics, making this vulnerability critical for organizations relying on accurate and secure data processing.

Potential Impact

For European organizations, the impact of CVE-2025-61763 can be severe, particularly for enterprises in finance, manufacturing, and utilities sectors that rely heavily on Oracle Essbase for business intelligence and financial reporting. Unauthorized data modification or deletion can lead to inaccurate financial statements, regulatory non-compliance, and loss of stakeholder trust. Confidential data exposure could result in intellectual property theft or competitive disadvantage. Given the vulnerability allows remote exploitation with low privileges, attackers could leverage compromised internal accounts or weakly protected network segments to escalate privileges and manipulate critical data. This could disrupt decision-making processes and potentially cause financial losses or legal penalties under GDPR and other data protection regulations. The lack of availability impact reduces the chance of service outages but does not mitigate the risk of data integrity and confidentiality breaches.

Mitigation Recommendations

European organizations should immediately audit and restrict network access to Oracle Essbase Web Platform interfaces, limiting exposure to trusted internal networks only. Implement strict access controls and enforce the principle of least privilege for all Oracle Essbase users, ensuring that accounts with network access have minimal permissions. Monitor and log all access and modification activities within Essbase to detect anomalous behavior indicative of exploitation attempts. Employ network segmentation and firewall rules to isolate Essbase servers from untrusted networks. Until an official patch is released by Oracle, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting Essbase endpoints. Regularly review Oracle security advisories for updates and apply patches promptly once available. Additionally, conduct penetration testing focused on Essbase to identify potential exploitation paths and remediate them proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.557Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97101721c03c6f13edc

Added to database: 10/21/2025, 8:13:37 PM

Last enriched: 10/28/2025, 8:29:38 PM

Last updated: 10/29/2025, 9:01:03 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats