Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
References
Configurations
History
No history.
Information
Published : 2025-10-12 03:15
Updated : 2025-10-27 17:08
NVD link : CVE-2025-61884
Mitre link : CVE-2025-61884
CVE.ORG link : CVE-2025-61884
JSON object : View
Products Affected
oracle
- configurator
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-93Improper Neutralization of CRLF Sequences ('CRLF Injection')
CWE-287Improper Authentication
CWE-444Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-501Trust Boundary Violation
CWE-918Server-Side Request Forgery (SSRF)
