Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21922: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Planning and Budgeting Cloud Service executes to compromise Oracle Planning and Budgeting Cloud Service. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Planning and Budgeting Cloud Service accessible data. in Oracle Corporation Oracle Planning and Budgeting Cloud Service

0
Medium
VulnerabilityCVE-2026-21922cvecve-2026-21922
Published: Tue Jan 20 2026 (01/20/2026, 21:56:19 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Planning and Budgeting Cloud Service

Description

CVE-2026-21922 is a medium severity vulnerability affecting Oracle Planning and Budgeting Cloud Service version 25. 04. 07, specifically its EPM Agent component. It allows a high privileged attacker with infrastructure logon to compromise the service by exploiting a flaw that requires human interaction from a third party. Successful exploitation can lead to unauthorized creation, deletion, or modification of critical data within the service. The vulnerability impacts data integrity but does not affect confidentiality or availability. Exploitation requires local access with high privileges and user interaction, limiting remote attack feasibility. No known exploits are currently reported in the wild. Organizations using this Oracle cloud service should update the EPM Agent promptly to mitigate risk. European entities relying on Oracle’s enterprise performance management tools are advised to prioritize patching due to potential data integrity risks.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:17:29 UTC

Technical Analysis

CVE-2026-21922 is a vulnerability in Oracle Planning and Budgeting Cloud Service version 25.04.07, specifically within the EPM Agent component. The flaw allows a high privileged attacker who already has logon access to the underlying infrastructure hosting the service to compromise the Oracle Planning and Budgeting Cloud Service. Exploitation requires human interaction from a user other than the attacker, indicating some form of social engineering or user-triggered action is necessary. The vulnerability does not expose confidentiality or availability but allows unauthorized modification, creation, or deletion of critical data managed by the service, thus impacting data integrity. The attack vector is local (AV:L), with low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to integrity (I:H) without affecting confidentiality (C:N) or availability (A:N). Oracle recommends updating the EPM Agent component to remediate the issue. No public exploits have been reported to date, but the vulnerability poses a risk to organizations relying on Oracle’s cloud-based enterprise performance management solutions, especially where attackers may gain privileged infrastructure access and leverage social engineering to trigger the exploit.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of critical financial and operational data managed within Oracle Planning and Budgeting Cloud Service. Unauthorized data modification or deletion could disrupt budgeting, forecasting, and financial planning processes, potentially leading to erroneous business decisions, regulatory compliance issues, and financial losses. Given that the attack requires high privileged access and user interaction, the threat is more relevant in environments where insider threats or compromised privileged accounts exist. Organizations in finance, manufacturing, and public sectors using Oracle’s cloud services are particularly vulnerable. The impact is compounded by the critical nature of the data handled by the service, which often supports strategic decision-making and regulatory reporting. While confidentiality and availability are not directly impacted, the integrity compromise alone can have cascading effects on business operations and trustworthiness of financial data.

Mitigation Recommendations

European organizations should immediately verify the version of Oracle Planning and Budgeting Cloud Service and ensure the EPM Agent is updated to the latest patched version as recommended by Oracle. Access to the underlying infrastructure must be tightly controlled, with strict privilege management and monitoring to prevent unauthorized high privileged logons. Implement robust user awareness training to reduce the risk of successful social engineering attacks that could trigger the required human interaction. Employ multi-factor authentication and session monitoring for privileged accounts to detect and prevent misuse. Regularly audit logs and configurations of the Oracle cloud environment to identify suspicious activities. Additionally, segment the infrastructure hosting Oracle services to limit lateral movement and isolate critical components. Establish incident response plans specific to cloud service compromises involving data integrity issues. Finally, coordinate with Oracle support for any additional security advisories or mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.708Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc484623b1157c519f27

Added to database: 1/20/2026, 10:06:00 PM

Last enriched: 1/28/2026, 8:17:29 PM

Last updated: 2/6/2026, 12:25:56 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats