Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21931: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle APEX Sample Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle APEX Sample Applications, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle APEX Sample Applications accessible data as well as unauthorized read access to a subset of Oracle APEX Sample Applications accessible data. in Oracle Corporation Oracle APEX Sample Applications

0
Medium
VulnerabilityCVE-2026-21931cvecve-2026-21931
Published: Tue Jan 20 2026 (01/20/2026, 21:56:23 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle APEX Sample Applications

Description

CVE-2026-21931 is a medium severity vulnerability affecting Oracle APEX Sample Applications versions 23. 2. 0 through 24. 2. 1. It allows a low privileged attacker with network access via HTTP to perform unauthorized read and write operations on accessible data within these sample applications. Exploitation requires user interaction from a person other than the attacker, and successful attacks may impact additional Oracle products beyond the sample applications. The vulnerability has a CVSS 3. 1 base score of 5. 4, reflecting limited confidentiality and integrity impacts but no availability impact.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:19:27 UTC

Technical Analysis

CVE-2026-21931 is a vulnerability identified in Oracle APEX Sample Applications, specifically in the Brookstrut Sample App component, affecting versions 23.2.0, 23.2.1, 24.1.0, 24.2.0, and 24.2.1. The flaw allows a low privileged attacker with network access via HTTP to compromise these sample applications by exploiting a weakness that requires user interaction from a third party. The vulnerability enables unauthorized update, insert, or delete operations, as well as unauthorized read access to subsets of data accessible through the Oracle APEX Sample Applications. The attack vector involves network access with low attack complexity and requires the attacker to have some privileges (PR:L) and user interaction (UI:R), but no elevated privileges or direct authentication bypass. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other Oracle products integrated or dependent on these sample applications. The CVSS score of 5.4 reflects limited confidentiality and integrity impacts, with no availability impact. Although no known exploits are currently reported, the vulnerability's ease of exploitation and potential to affect multiple products make it a significant concern for organizations relying on Oracle APEX environments.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data manipulation and disclosure within Oracle APEX environments, which are widely used for rapid web application development and deployment. The ability for a low privileged attacker to perform unauthorized insert, update, delete, and read operations could lead to data integrity issues, leakage of sensitive information, and potential compliance violations under regulations such as GDPR. The requirement for user interaction means phishing or social engineering could be leveraged to trigger exploitation, increasing the risk in environments with less stringent user awareness training. Additionally, the scope change indicates that exploitation could affect other Oracle products interconnected with APEX, potentially broadening the impact. Organizations in sectors such as finance, healthcare, and government, which often use Oracle technologies and handle sensitive data, may face increased operational and reputational risks if this vulnerability is exploited.

Mitigation Recommendations

European organizations should immediately assess their Oracle APEX environments to identify deployments of the affected sample application versions (23.2.0 through 24.2.1). Where possible, upgrade to patched versions once Oracle releases fixes or apply any available interim mitigations such as disabling or restricting access to the vulnerable sample applications. Implement strict network segmentation and firewall rules to limit HTTP access to Oracle APEX environments only to trusted users and networks. Enhance user awareness training to reduce the risk of social engineering attacks that could trigger the required user interaction. Monitor Oracle APEX logs for unusual insert, update, or delete activities and unauthorized data access attempts. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting APEX sample applications. Finally, review and tighten application-level access controls to minimize privileges assigned to users and services interacting with Oracle APEX.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.709Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc484623b1157c519f42

Added to database: 1/20/2026, 10:06:00 PM

Last enriched: 1/28/2026, 8:19:27 PM

Last updated: 2/6/2026, 12:26:40 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats