Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61764: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. in Oracle Corporation Oracle WebLogic Server

0
Medium
VulnerabilityCVE-2025-61764cvecve-2025-61764
Published: Tue Oct 21 2025 (10/21/2025, 20:03:14 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle WebLogic Server

Description

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

AI-Powered Analysis

AILast updated: 10/28/2025, 22:05:48 UTC

Technical Analysis

CVE-2025-61764 is a vulnerability identified in Oracle WebLogic Server, specifically affecting versions 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0. The flaw resides in the Core component of Oracle Fusion Middleware and allows an unauthenticated attacker with network access via HTTP to exploit improper access control mechanisms (classified under CWE-200: Exposure of Sensitive Information to an Unauthorized Actor). The attacker can gain unauthorized read access to a subset of data accessible through the WebLogic Server, potentially exposing sensitive configuration or operational information. The vulnerability does not require any user interaction or prior authentication, making it easily exploitable remotely over the network with low attack complexity. The CVSS 3.1 base score is 5.3, reflecting a medium severity focused on confidentiality impact (C:L), with no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component without impacting other system components. No known exploits have been reported in the wild as of the publication date, but the ease of exploitation and network accessibility make it a significant risk. Oracle has not yet published patches, so mitigation currently relies on network-level controls and monitoring. This vulnerability is particularly concerning for organizations relying on Oracle WebLogic Server for critical middleware services, as unauthorized data disclosure can aid attackers in further reconnaissance or targeted attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-61764 is unauthorized disclosure of sensitive data hosted or processed by Oracle WebLogic Server instances. This could include configuration details, internal application data, or other sensitive information that may facilitate further attacks or data breaches. Sectors such as finance, government, healthcare, and critical infrastructure that rely heavily on Oracle WebLogic for middleware services are at heightened risk. Data exposure could lead to regulatory compliance issues under GDPR, reputational damage, and potential financial losses. Since the vulnerability does not affect integrity or availability, direct service disruption or data manipulation is unlikely; however, the confidentiality breach alone can have cascading effects. The ease of exploitation without authentication increases the risk of opportunistic attacks, especially if WebLogic servers are exposed to untrusted networks or the internet. Organizations with insufficient network segmentation or monitoring may be more vulnerable to exploitation attempts.

Mitigation Recommendations

1. Apply Oracle-provided patches immediately once they become available to remediate the vulnerability at the source. 2. Until patches are released, restrict network access to Oracle WebLogic Server instances by implementing strict firewall rules limiting HTTP access only to trusted internal IP addresses or VPNs. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting WebLogic Server endpoints. 4. Conduct thorough network and application logging and monitoring to identify anomalous access patterns or unauthorized data retrieval attempts. 5. Review and harden WebLogic Server configurations to minimize exposed data surfaces and disable unnecessary services or interfaces. 6. Perform regular vulnerability scanning and penetration testing focused on middleware components to detect similar issues proactively. 7. Educate IT and security teams about this vulnerability to ensure rapid incident response if exploitation is suspected. 8. Consider network segmentation to isolate WebLogic servers from less trusted network zones and reduce attack surface exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.557Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97101721c03c6f13edf

Added to database: 10/21/2025, 8:13:37 PM

Last enriched: 10/28/2025, 10:05:48 PM

Last updated: 10/30/2025, 9:14:25 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats