Skip to main content
  1. Active Vulnerability List/
  2. 2025/

CVE-2025-61884 | Oracle | ID

VulnerabilityCVE-2025-61884
TypeInformation Disclosure / Remote Access (CWE-22: Path Traversal / Improper Access Control)
DescriptionA vulnerability in the Runtime UI component of Oracle Configurator (within Oracle E-Business Suite) allows a remote, unauthenticated attacker to access sensitive Configurator data via crafted HTTP requests. Exploitation may expose critical configuration or business data.
Affected SystemsOracle Configurator (Oracle E-Business Suite) versions 12.2.3 through 12.2.14
Attack VectorNetwork (HTTP) — no authentication required
Exploit MechanismThe Runtime UI improperly validates crafted HTTP requests, enabling attackers to access internal Configurator resources and retrieve sensitive information without authentication.
Impact of the BugHigh confidentiality impact — unauthorized disclosure of sensitive configuration data, business logic, or proprietary information.
Detection Techniques• Monitor HTTP logs for abnormal requests targeting Configurator Runtime UI endpoints
• Review server logs for unauthenticated access attempts
• Scan for environments running affected Configurator versions
• Analyze network traffic for unexpected data retrieval behavior
How to Detect if Exploited• Check logs for Runtime UI access from unknown or external IPs
• Look for unusual or large data responses from Configurator endpoints
• Review audit trails for unauthorized data access events
• Verify whether the Configurator component was externally exposed
Mitigation Steps• Apply Oracle’s October 2025 patch addressing CVE-2025-61884
• Restrict network access to the Configurator Runtime UI (firewalls, segmentation)
• Disable unused E-Business Suite modules to reduce attack surface
• Continuously monitor and audit access to Configurator endpoints