Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61884: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. in Oracle Corporation Oracle Configurator

0
High
VulnerabilityCVE-2025-61884cvecve-2025-61884
Published: Sun Oct 12 2025 (10/12/2025, 02:34:51 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Configurator

Description

Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:06:18 UTC

Technical Analysis

CVE-2025-61884 is a vulnerability identified in the Oracle Configurator component of Oracle E-Business Suite, specifically affecting versions 12.2.3 through 12.2.14. The flaw resides in the Runtime UI component and allows an unauthenticated attacker to exploit the system remotely over HTTP without requiring any user interaction or prior authentication. The vulnerability is classified under multiple CWEs including CWE-918 (Server-Side Request Forgery), CWE-22 (Path Traversal), CWE-93 (Improper Neutralization of CRLF Sequences), CWE-444 (Inconsistent Interpretation of HTTP Requests), CWE-287 (Improper Authentication), and CWE-501 (Trust Boundary Violation), indicating a complex attack surface involving improper request handling and authentication bypass. Successful exploitation results in unauthorized access to sensitive or all data accessible via Oracle Configurator, severely compromising confidentiality. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) reflects network attack vector, low attack complexity, no privileges or user interaction required, and high confidentiality impact without affecting integrity or availability. Although no public exploits have been reported yet, the ease of exploitation and critical data exposure potential make this a significant threat. Oracle has not yet published patches, so mitigation currently relies on network controls and monitoring.

Potential Impact

The impact of CVE-2025-61884 is primarily on confidentiality, allowing attackers to access sensitive business data managed by Oracle Configurator without authentication. This can lead to exposure of proprietary configurations, customer information, or intellectual property, potentially resulting in financial loss, reputational damage, and regulatory compliance violations. Since Oracle Configurator is often used in complex enterprise environments for product configuration and sales processes, unauthorized data access could disrupt business operations and competitive positioning. The lack of impact on integrity and availability reduces the risk of data tampering or service disruption but does not diminish the severity of data leakage. Organizations worldwide relying on Oracle E-Business Suite for critical business functions are at risk, especially those with internet-facing Oracle Configurator interfaces or insufficient network segmentation. The absence of known exploits currently provides a limited window for proactive defense before potential exploitation attempts emerge.

Mitigation Recommendations

Until official patches are released by Oracle, organizations should implement strict network-level controls to restrict HTTP access to Oracle Configurator interfaces, limiting exposure to trusted internal networks only. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests indicative of path traversal, request forgery, or authentication bypass attempts. Conduct thorough logging and monitoring of Oracle Configurator access logs to identify anomalous or unauthorized access patterns. Employ network segmentation to isolate Oracle E-Business Suite components from general user networks and the internet. Review and harden Oracle Configurator configurations to disable unnecessary features or interfaces exposed externally. Prepare for rapid deployment of Oracle patches once available by maintaining an up-to-date asset inventory and testing environment. Additionally, conduct security awareness training for administrators to recognize and respond to potential exploitation attempts. Consider engaging Oracle support for guidance and potential workarounds.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-10-03T06:59:29.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68eb18ce5baaa01f1c02ffa2

Added to database: 10/12/2025, 2:56:14 AM

Last enriched: 2/27/2026, 4:06:18 AM

Last updated: 3/23/2026, 11:03:34 PM

Views: 519

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses