Vulnerability in Oracle HTTP Server and Weblogic Server Proxy Plug-in
CVE-2026-21962

10CRITICAL

Key Information:

Vendor

Oracle

Vendor
CVE Published:
20 January 2026

Badges

🔥 Trending now🥇 Trended No. 1📈 Trended📈 Score: 4,460👾 Exploit Exists🟡 Public PoC

What is CVE-2026-21962?

CVE-2026-21962 is a critical vulnerability associated with Oracle’s HTTP Server and the Weblogic Server Proxy Plug-in, specifically designed for Oracle Fusion Middleware. This issue affects specific supported versions, namely 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0. The vulnerability allows unauthenticated attackers with network access via HTTP to compromise the Oracle HTTP Server and its accompanying Proxy Plug-ins. The technical nature of this flaw means that it could lead to unauthorized access, allowing attackers to create, delete, or modify critical data accessible via these systems. The severity of the vulnerability is underscored by its CVSS score of 10.0, indicating that it has the potential for severe impacts on confidentiality and integrity, posing a significant threat to organizations utilizing these Oracle products.

Potential impact of CVE-2026-21962

  1. Unauthorized Data Access: The vulnerability can be exploited to gain unauthorized access to critical data, exposing sensitive information that could lead to data breaches and compliance violations.

  2. Data Manipulation and Deletion: Attackers could exploit this flaw to create, modify, or delete data, compromising the integrity of information stored within Oracle HTTP Server systems, leading to severe operational disruptions.

  3. Broader Product Vulnerability: While the vulnerability resides within specific components, successful exploitation may affect additional Oracle products connected to or relying on the compromised systems, resulting in a wider impact across the organization’s IT infrastructure.

Affected Version(s)

Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in 12.2.1.4.0

Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in 14.1.1.0.0

Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in 14.1.2.0.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 👾

    Exploit known to exist

  • 📈

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

.