Security Flaw in Oracle E-Business Suite Components
CVE-2025-61884

7.5HIGH

Key Information:

Vendor

Oracle

Vendor
CVE Published:
12 October 2025

Badges

🥇 Trended No. 1📈 Trended📈 Score: 5,950💰 Ransomware👾 Exploit Exists🟡 Public PoC🟣 EPSS 34%🦅 CISA Reported📰 News Worthy

What is CVE-2025-61884?

CVE-2025-61884 is a security vulnerability found in the Oracle E-Business Suite, specifically within the Oracle Configurator component, which plays a crucial role in managing complex configurations and product offerings for enterprises. This vulnerability poses a serious risk to organizations, as it allows an unauthenticated attacker with network access via HTTP to potentially exploit Oracle Configurator. If successfully exploited, attackers could gain unauthorized access to sensitive data or even achieve complete control over all data accessible through the Oracle Configurator. The vulnerability has been assigned a CVSS 3.1 base score of 7.5, indicating a high level of severity primarily due to its potential impact on confidentiality.

Potential impact of CVE-2025-61884

  1. Unauthorized Data Access: The vulnerability may allow attackers to access critical and confidential data, leading to potential data breaches that could expose sensitive business information.

  2. System Compromise: Successful exploitation may also grant complete control over the Oracle Configurator component, allowing malicious actors to manipulate configurations, disrupt operations, or launch further attacks on integrated systems.

  3. Reputational Damage: Organizations affected by this vulnerability may face significant reputational harm if sensitive data is compromised, leading to loss of customer trust and potential legal ramifications.

CISA has reported CVE-2025-61884

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-61884 as being exploited and is known by the CISA as enabling ransomware campaigns.

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Oracle Configurator 12.2.3 <= 12.2.14

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CISA: Oracle vulnerability is being actively exploited

CISA forces federal organizations to install Oracle patch for actively exploited SSRF vulnerability. Oracle does not confirm exploitation.

US cyber agency adds 5 known exploited vulnerabilities to KEV listing

Multiple Apple products and Oracle’s E-Business Suite feature in CISA’s latest addition to the KEV catalogue.

CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw

CISA has confirmed that an Oracle E-Business Suite flaw tracked as CVE-2025-61884 is being exploited in attacks, adding it to its Known Exploited Vulnerabilities catalog.

References

EPSS Score

34% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 📈

    Vulnerability started trending

  • 🟡

    Public PoC available

  • 📰

    First article discovered by Help Net Security

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-61884 : Security Flaw in Oracle E-Business Suite Components