Vulnerability in Oracle HTTP Server and Weblogic Server Proxy Plug-in
CVE-2026-21962
Key Information:
- Vendor
Oracle
- Vendor
- CVE Published:
- 20 January 2026
Badges
What is CVE-2026-21962?
CVE-2026-21962 is a critical vulnerability associated with Oracle’s HTTP Server and the Weblogic Server Proxy Plug-in, specifically designed for Oracle Fusion Middleware. This issue affects specific supported versions, namely 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0. The vulnerability allows unauthenticated attackers with network access via HTTP to compromise the Oracle HTTP Server and its accompanying Proxy Plug-ins. The technical nature of this flaw means that it could lead to unauthorized access, allowing attackers to create, delete, or modify critical data accessible via these systems. The severity of the vulnerability is underscored by its CVSS score of 10.0, indicating that it has the potential for severe impacts on confidentiality and integrity, posing a significant threat to organizations utilizing these Oracle products.
Potential impact of CVE-2026-21962
-
Unauthorized Data Access: The vulnerability can be exploited to gain unauthorized access to critical data, exposing sensitive information that could lead to data breaches and compliance violations.
-
Data Manipulation and Deletion: Attackers could exploit this flaw to create, modify, or delete data, compromising the integrity of information stored within Oracle HTTP Server systems, leading to severe operational disruptions.
-
Broader Product Vulnerability: While the vulnerability resides within specific components, successful exploitation may affect additional Oracle products connected to or relying on the compromised systems, resulting in a wider impact across the organization’s IT infrastructure.
Affected Version(s)
Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in 12.2.1.4.0
Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in 14.1.1.0.0
Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in 14.1.2.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 🥇
Vulnerability reached the number 1 worldwide trending spot
- 👾
Exploit known to exist
- 📈
Vulnerability started trending
Vulnerability published
Vulnerability Reserved