CVE-2019-2725

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
References
Link Resource
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html Patch Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch Vendor Advisory
http://www.securityfocus.com/bid/108074 Broken Link
https://support.f5.com/csp/article/K90059138 Third Party Advisory
https://www.exploit-db.com/exploits/46780/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Patch Vendor Advisory
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html Patch Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch Vendor Advisory
http://www.securityfocus.com/bid/108074 Broken Link
https://support.f5.com/csp/article/K90059138 Third Party Advisory
https://www.exploit-db.com/exploits/46780/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Patch Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:5.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tape_virtual_storage_manager_gui:6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:5.2.36:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*

History

22 Oct 2025, 00:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 -

21 Oct 2025, 20:17

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 -

21 Nov 2024, 04:41

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References () http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html - Patch, Vendor Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/108074 - Broken Link () http://www.securityfocus.com/bid/108074 - Broken Link
References () https://support.f5.com/csp/article/K90059138 - Third Party Advisory () https://support.f5.com/csp/article/K90059138 - Third Party Advisory
References () https://www.exploit-db.com/exploits/46780/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46780/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW - Patch, Vendor Advisory
References () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Vendor Advisory

27 Apr 2022, 16:39

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:5.2.36:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tape_virtual_storage_manager_gui:6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:5.1:*:*:*:*:*:*:*
References
  • (MISC) https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW - Patch, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/108074 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/108074 - Broken Link
References (MISC) http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - (MISC) http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Vendor Advisory
References (MISC) http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Vendor Advisory

Information

Published : 2019-04-26 19:29

Updated : 2025-10-22 00:16


NVD link : CVE-2019-2725

Mitre link : CVE-2019-2725

CVE.ORG link : CVE-2019-2725


JSON object : View

Products Affected

oracle

  • agile_plm
  • peoplesoft_enterprise_peopletools
  • vm_virtualbox
  • weblogic_server
  • tape_virtual_storage_manager_gui
  • tape_library_acsls
  • storagetek_tape_analytics_sw_tool
  • communications_converged_application_server
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')