Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
References
Configurations
History
21 Oct 2025, 23:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 12:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oracle:configurator:*:*:*:*:*:*:*:* | |
| First Time |
Oracle configurator
Oracle |
|
| References | () https://www.oracle.com/security-alerts/alert-cve-2025-61884.html - Vendor Advisory | |
| References | () https://blogs.oracle.com/security/post/apply-july-2025-cpu - Vendor Advisory | |
| References | () https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/ - Exploit, Press/Media Coverage |
16 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-93 CWE-918 CWE-22 CWE-287 CWE-501 CWE-444 |
|
| References |
|
12 Oct 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-12 03:15
Updated : 2025-10-21 23:17
NVD link : CVE-2025-61884
Mitre link : CVE-2025-61884
CVE.ORG link : CVE-2025-61884
JSON object : View
Products Affected
oracle
- configurator
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-93Improper Neutralization of CRLF Sequences ('CRLF Injection')
CWE-287Improper Authentication
CWE-444Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
CWE-501Trust Boundary Violation
CWE-918Server-Side Request Forgery (SSRF)
