Cyber Posture

CVE-2025-61884

HighCISA KEVActive ExploitationPublic PoCRansomware-linked

Published: 12 October 2025

Published
12 October 2025
Modified
27 October 2025
KEV Added
20 October 2025
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.4832 97.8th percentile
Risk Priority 64 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-61884 is a high-severity Path Traversal (CWE-22) vulnerability in Oracle Configurator. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 2.2% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-61884 by requiring timely remediation through patching of the vulnerable Oracle Configurator Runtime UI component as recommended by Oracle and CISA KEV.

prevent

Addresses core CWEs (CWE-22 Path Traversal, CWE-93 CRLF Injection, CWE-444 HTTP Smuggling, CWE-918 SSRF) by validating and sanitizing HTTP inputs to the Runtime UI, preventing exploitation.

preventdetect

Enforces boundary protection at HTTP interfaces using firewalls or WAFs to monitor, filter, and block unauthenticated network attacks exploiting the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote exploitation of a public-facing HTTP web application (Oracle Configurator Runtime UI) via multiple CWEs including path traversal and SSRF, enabling unauthorized data access, directly maps to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability…

more

can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Deeper analysisAI

CVE-2025-61884 is a vulnerability in the Oracle Configurator product of Oracle E-Business Suite, specifically affecting the Runtime UI component. Supported versions 12.2.3 through 12.2.14 are impacted. It carries a CVSS 3.1 Base Score of 7.5 (vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), with Confidentiality impacts rated High. The issue is associated with multiple CWE identifiers, including CWE-22 (Path Traversal), CWE-93 (Improper Neutralization of CRLF Sequences), CWE-287 (Improper Authentication), CWE-444 (Inconsistent Interpretation of HTTP Requests), CWE-501 (Trust Boundary Violation), and CWE-918 (Server-Side Request Forgery).

The vulnerability is easily exploitable by an unauthenticated attacker with network access via HTTP, allowing them to compromise the Oracle Configurator. Successful exploitation results in unauthorized access to critical data or complete access to all data accessible by Oracle Configurator.

Oracle advisories, including the security alert for CVE-2025-61884 and the July 2025 Critical Patch Update blog post, recommend applying the latest patches to mitigate the issue. Additional references include analysis from Watchtowr Labs on related Oracle E-Business Suite vulnerabilities and listing in the CISA Known Exploited Vulnerabilities catalog.

This vulnerability appears in the context of broader Oracle E-Business Suite issues, with CISA confirming active exploitation in the wild.

Details

CWE(s)
KEV Date Added
20 October 2025

Affected Products

oracle
configurator
12.2.3 — 12.2.14

CVEs Like This One

CVE-2025-61882Same vendor: Oracleboth on KEV
CVE-2025-61757Same vendor: Oracleboth on KEV
CVE-2025-50060Same vendor: Oracle
CVE-2026-34305Same vendor: Oracle
CVE-2026-34279Same vendor: Oracle
CVE-2026-21992Same vendor: Oracle
CVE-2026-34291Same vendor: Oracle
CVE-2026-22016Same vendor: Oracle
CVE-2025-21565Same vendor: Oracle
CVE-2026-34287Same vendor: Oracle

References