Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21962: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in. While the vulnerability is in Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data as well as unauthorized access to critical data or complete access to all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data. in Oracle Corporation Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in

0
Critical
VulnerabilityCVE-2026-21962cvecve-2026-21962
Published: Tue Jan 20 2026 (01/20/2026, 21:56:32 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in

Description

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in. While the vulnerability is in Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data as well as unauthorized access to critical data or complete access to all Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in accessible data. Note: Affected version for Weblogic Server Proxy Plug-in for IIS is 12.2.1.4.0 only. CVSS 3.1 Base Score 10.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).

AI-Powered Analysis

AILast updated: 02/05/2026, 08:26:28 UTC

Technical Analysis

CVE-2026-21962 is a severe vulnerability found in Oracle HTTP Server and the Oracle Weblogic Server Proxy Plug-in, components of Oracle Fusion Middleware. The vulnerability affects versions 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0, including the Weblogic Server Proxy Plug-in for IIS version 12.2.1.4.0. It allows an unauthenticated attacker with network access over HTTP to exploit the flaw without any user interaction or privileges. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the affected components fail to enforce proper access restrictions. Successful exploitation results in unauthorized creation, deletion, or modification of critical data accessible through the Oracle HTTP Server or Weblogic Server Proxy Plug-in, leading to complete compromise of confidentiality and integrity. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N) highlights that the attack can be launched remotely with low complexity, no privileges, and no user interaction, affecting the entire security scope with high confidentiality and integrity impacts but no availability impact. Although no public exploits are known yet, the vulnerability's critical nature and broad impact on Oracle products necessitate urgent mitigation. The scope change indicates that exploitation may affect additional Oracle products beyond the initially identified components, potentially amplifying the damage. This vulnerability is particularly concerning for environments where Oracle HTTP Server and Weblogic Proxy Plug-in serve as critical middleware or proxy layers, as attackers could manipulate or exfiltrate sensitive data or disrupt business processes by unauthorized data modification.

Potential Impact

For European organizations, the impact of CVE-2026-21962 is substantial due to the widespread use of Oracle Fusion Middleware in enterprise IT environments, including government, finance, telecommunications, and critical infrastructure sectors. Exploitation could lead to unauthorized data manipulation, loss of data integrity, and exposure of sensitive information, potentially causing operational disruptions, regulatory non-compliance (e.g., GDPR breaches), financial losses, and reputational damage. The ability to exploit this vulnerability without authentication or user interaction increases the risk of automated attacks and rapid compromise of vulnerable systems. Additionally, the scope change implies that other Oracle products integrated with the affected components may also be compromised, expanding the attack surface. European organizations relying on Oracle HTTP Server as a front-end or proxy for Weblogic Server applications could see cascading effects impacting multiple business-critical applications. The lack of availability impact reduces the likelihood of denial-of-service conditions but does not diminish the severity of confidentiality and integrity breaches. Given the criticality and ease of exploitation, attackers could leverage this vulnerability for espionage, data theft, or as a foothold for further network penetration within European enterprises.

Mitigation Recommendations

1. Immediate application of Oracle's security patches once released is paramount; organizations should monitor Oracle's official advisories closely. 2. Until patches are available, restrict network access to Oracle HTTP Server and Weblogic Proxy Plug-in components by implementing strict firewall rules limiting HTTP access to trusted IP addresses only. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting Oracle Fusion Middleware components. 4. Conduct thorough network segmentation to isolate Oracle middleware servers from less trusted network zones and limit lateral movement opportunities. 5. Enable detailed logging and monitoring of Oracle HTTP Server and Weblogic Proxy Plug-in activities to detect anomalous behavior indicative of exploitation attempts. 6. Review and harden access control configurations within Oracle Fusion Middleware to minimize exposure of critical data. 7. Perform vulnerability scanning and penetration testing focused on Oracle HTTP Server and Weblogic Proxy Plug-in to identify and remediate any residual weaknesses. 8. Educate IT and security teams about the vulnerability specifics and response procedures to ensure rapid detection and containment. 9. Consider deploying intrusion detection/prevention systems (IDS/IPS) signatures tailored for this CVE once available. 10. Maintain an incident response plan that includes scenarios involving Oracle middleware compromise to ensure preparedness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc4b4623b1157c519fc6

Added to database: 1/20/2026, 10:06:03 PM

Last enriched: 2/5/2026, 8:26:28 AM

Last updated: 2/7/2026, 2:07:42 PM

Views: 1435

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats