Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
References
Configurations
History
21 Oct 2025, 23:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Oct 2025, 20:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Oct 2025, 19:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Oct 2025, 12:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:configurator:*:*:*:*:*:*:*:* | |
References | () https://www.oracle.com/security-alerts/alert-cve-2025-61884.html - Vendor Advisory | |
References | () https://blogs.oracle.com/security/post/apply-july-2025-cpu - Vendor Advisory | |
References | () https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/ - Exploit, Press/Media Coverage | |
First Time |
Oracle
Oracle configurator |
16 Oct 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-287 CWE-918 CWE-501 CWE-93 CWE-22 CWE-444 |
12 Oct 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-12 03:15
Updated : 2025-10-21 23:17
NVD link : CVE-2025-61884
Mitre link : CVE-2025-61884
CVE.ORG link : CVE-2025-61884
JSON object : View
Products Affected
oracle
- configurator
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-93Improper Neutralization of CRLF Sequences ('CRLF Injection')
CWE-287Improper Authentication
CWE-444Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-501Trust Boundary Violation
CWE-918Server-Side Request Forgery (SSRF)