BACK TO ARCHIVE
HOME/INTELLIGENCE/CVE-2025-61884: Critical SSRF in Oracle E-Business Suite Oracle Configurator
CVE-2025-61884
10/20/2025
CVSS 9.3 • CRITICAL

CVE-2025-61884: Critical SSRF in Oracle E-Business Suite Oracle Configurator

Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication.

FREQUENTLY ASKED

What is CVE-2025-61884 and why does it matter?

CVE-2025-61884 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the Oracle Configurator component of Oracle E-Business Suite. With a CVSS score of 7.5, it matters because an unauthenticated attacker can remotely exploit it via HTTP to gain unauthorized access to critical configuration and business data, potentially leading to a full compromise of the application's sensitive internal assets.

Which versions of Oracle E-Business Suite are affected?

According to the official advisory, Oracle E-Business Suite versions 12.2.3 through 12.2.14 are affected by this vulnerability. Specifically, the Runtime UI component of the Oracle Configurator product contains the flaw that allows for unauthenticated network access and subsequent data exposure. Organizations running these versions should prioritize an audit of their deployment and immediate application of patches.

Has an official patch been released for this vulnerability?

Yes, Oracle has addressed this vulnerability in the July 2025 Critical Patch Update (CPU). Administrators are advised to visit the Oracle Security Blog or the official Oracle Security Alerts portal to obtain the specific patch instructions and download links necessary to secure the Runtime UI component in the Oracle Configurator module of the E-Business Suite environment.

What is the remediation deadline and what does it mean for compliance?

The remediation deadline is set for 2025-11-10. For organizations subject to CISA BOD 22-01 or similar federal and commercial compliance frameworks, this date represents the mandatory window by which the vulnerability must be mitigated. Failure to patch by this date may result in compliance violations, increased risk of ransomware exploitation, and significant exposure to automated threat actors.

How can I check if my Oracle E-Business Suite instance is affected?

To determine if your instance is affected, first verify the installed version of Oracle E-Business Suite; any version between 12.2.3 and 12.2.14 is vulnerable. Check the patch levels for the Oracle Configurator component (Runtime UI) to see if the July 2025 Critical Patch Update has been successfully applied. Automated vulnerability scanners utilizing the latest CVE-2025-61884 definitions can also identify exposed Runtime UI endpoints.

THREAT SURVEY

VULNERABILITY TARGET

E-Business Suite

VENDOR SOURCE

Oracle

CLASSIFIERS

CWE-918CWE-22CWE-93CWE-444CWE-287CWE-501

REMEDIATION PULSE

Critical patching mandated by November 10, 2025.

EXPLOITATION STATUS: ACTIVE_WILDFIRE

RELATED INTELLIGENCE

View All
CVE-2025-49704

CVE-2025-49704: Critical Microsoft SharePoint Code Injection Vulnerability Advisory

Microsoft SharePoint contains a code injection vulnerability that could allow an authorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-49706. CVE-2025-53770 is a patch bypass for CVE-2025-49704, and the updates for CVE-2025-53770 include more robust protection than those for CVE-2025-49704.

CVE-2026-2441

CVE-2026-2441: Critical Use-After-Free Vulnerability in Google Chromium CSS Engine

Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

CVE-2026-20131

Critical Alert: CVE-2026-20131 Root RCE Vulnerability in Cisco Secure Firewall Management Center

Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.

Defend the Architecture.

Real-time intelligence drops for the global software supply chain.

Executive Summary

CVE-2025-61884 identifies a critical Server-Side Request Forgery (SSRF) vulnerability within the Oracle Configurator component of the Oracle E-Business Suite (EBS). With a CVSS v3.1 score of 7.5 and a high EPSS score of 0.60803, this flaw presents a significant risk to enterprise environments, as it allows unauthenticated attackers to gain network access via HTTP and compromise the integrity of Oracle Configurator data. Remediation is mandatory by November 10, 2025, to remain compliant with federal security mandates and to protect against known active exploitation.

Vulnerability Profile Table

FieldValue
CVE IDCVE-2025-61884
Affected Product & VersionsOracle E-Business Suite 12.2.3 - 12.2.14
CVSS Score & Severity7.5 (HIGH)
CVSS Version3.1
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
Attack ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
CWE IDsCWE-918, CWE-22, CWE-93, CWE-444, CWE-287, CWE-501
Date Disclosed2025-10-20
Remediation Deadline2025-11-10
SSVC Exploitation StatusActive
Known Ransomware UseYes
EPSS Score & Percentile0.60803 (98.3%)
Patch AvailableYes (July 2025 CPU)

Technical Deep Dive: Understanding the Multi-Vector Attack Surface

The vulnerability in CVE-2025-61884 is not a simple SSRF; it is an amalgamation of several critical weaknesses within the Runtime UI component of Oracle Configurator. To understand the blast radius, one must examine how these CWEs interact to form a potent exploit chain.

The Role of SSRF and Trust Boundary Violations

At its core, CWE-918 (Server-Side Request Forgery) allows an attacker to manipulate the Oracle server into making HTTP requests to internal or external resources that should be unreachable from the public internet. This is exacerbated by CWE-501 (Trust Boundary Violation), where the application fails to differentiate between trusted internal data and untrusted user input. By bypassing these boundaries, an attacker can pivot from the web-facing Configurator UI to internal services, such as database management interfaces or cloud metadata services (IMDS), effectively using the EBS server as a proxy.

Path Traversal and Request Smuggling Synergy

The inclusion of CWE-22 (Path Traversal) suggests that the vulnerability allows attackers to navigate the server's file system beyond the intended directory, likely to access configuration files or sensitive keystores. When combined with CWE-444 (HTTP Request/Response Smuggling) and CWE-93 (CRLF Injection), the attack becomes even more sophisticated. Smuggling allows an attacker to "hide" a request within another, de-syncing the communication between the load balancer and the back-end Oracle server. This de-synchronization can be used to bypass authentication mechanisms (CWE-287), leading to the unauthenticated access state described in the vendor advisory.

Attack Surface and Blast Radius

The attack surface is the Runtime UI component, which is often exposed to facilitate customer and partner configurations in Oracle EBS. The blast radius is extensive: successful exploitation results in unauthorized access to all data accessible by the Oracle Configurator. In many enterprises, this includes pricing structures, proprietary product configurations, and customer-specific supply chain data. Given that the SSVC exploitation status is "active," threat actors are likely already scanning for exposed EBS instances to exploit this chain.

Who Is Affected by the Oracle Configurator Vulnerability?

This vulnerability impacts organizations globally that rely on Oracle E-Business Suite for their Enterprise Resource Planning (ERP) and supply chain management. Specifically, users running versions 12.2.3 through 12.2.14 are at risk.

Compliance Note: CISA BOD 22-01

Due to the "Known Ransomware Use" and active exploitation status, this CVE falls under the scope of CISA Binding Operational Directive (BOD) 22-01. Federal agencies and organizations following CISA guidance must apply the necessary mitigations by the November 10, 2025 deadline. Failure to address this vulnerability within the specified window significantly increases the risk of a data breach and potential ransomware deployment, as indicated by the high EPSS percentile (98.3%).

Official Remediation and Patching Guidelines

Oracle has released security updates to address this flaw. Organizations should follow these steps immediately:

  1. Identify Vulnerable Instances: Audit your EBS environment to confirm if the Runtime UI component is active and if the version falls between 12.2.3 and 12.2.14.
  2. Apply July 2025 CPU: Download and apply the July 2025 Critical Patch Update (CPU) for Oracle E-Business Suite. This update contains the necessary fixes for the SSRF and associated request smuggling flaws.
  3. Consult Official Documentation: Refer to the Oracle Security Blog and the Security Alert for CVE-2025-61884 for specific patch IDs relative to your base version.
  4. Verify Patch Integrity: After installation, use automated scanning tools to ensure the Runtime UI endpoints no longer respond to SSRF-style payloads or smuggled headers.
  5. Discontinue Unused Components: If the Oracle Configurator Runtime UI is not required for business operations, consider disabling the component entirely to reduce the attack surface.

Defense-in-Depth: Strategic Security Recommendations

Beyond patching, implementing these best practices will strengthen your EBS security posture against SSRF and smuggling attacks:

  • Implement Egress Filtering: Restrict the EBS application server's ability to initiate outbound connections. Only allow requests to known, necessary internal and external endpoints (Allowlisting).
  • Strengthen WAF Rules: Configure your Web Application Firewall (WAF) to detect and block CRLF injection patterns and inconsistent HTTP headers characteristic of request smuggling (CWE-444).
  • Disable Unauthenticated UI Access: Where possible, place the Oracle Configurator Runtime UI behind a VPN or a Zero Trust Network Access (ZTNA) gateway to ensure only authenticated users can reach the component.
  • Enable Detailed Logging: Monitor HTTP request logs for unusual destination IPs or malformed headers. Ensure logs are forwarded to a SIEM for real-time threat detection.
  • Hardened Cloud Infrastructure: If EBS is hosted in the cloud, restrict access to the Instance Metadata Service (IMDSv2) to prevent SSRF from being used to steal cloud identity tokens.
  • Regular Vulnerability Assessments: Given the active exploitation of EBS vulnerabilities, perform weekly automated scans focused on the Oracle E-Business Suite stack to catch newly disclosed issues before attackers can weaponize them.