Oracle Critical Patch Update Advisory - January 2026
Created on 2026-01-21 21:18, updated on 2026-01-21 21:18, by Alexandre DulaunoyDescription
Oracle Critical Patch Update Advisory - January 2026
Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 337 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at January 2026 Critical Patch Update: Executive Summary and Analysis.
Affected Products and Patch Information
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
- Affected Products and Versions: JD Edwards EnterpriseOne Tools, versions 9.2.0.0-9.2.26.0
- Patch Availability Document: JD Edwards
- Affected Products and Versions: MySQL Cluster, versions 7.6.0-7.6.36, 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Connectors, versions 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Enterprise Backup, versions 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Server, versions 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Workbench, versions 8.0.0-8.0.45
- Patch Availability Document: MySQL
- Affected Products and Versions: Oracle Access Manager, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Agile PLM, version 9.3.6
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle Agile Product Lifecycle Management for Process, version 6.2.4
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle APEX Sample Applications, versions 23.2.0, 23.2.1, 24.1.0, 24.2.0, 24.2.1
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Application Testing Suite, version 13.3.0.1
- Patch Availability Document: Oracle Enterprise Manager
- Affected Products and Versions: Oracle Autovue for Agile Product Lifecycle Management, version 21.1.0
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle AutoVue Office, version 21.1.0
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle Banking Branch, versions 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Cash Management, versions 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Corporate Lending Process Management, versions 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Liquidity Management, versions 14.5.0.14.0, 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Supply Chain Finance, versions 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle BI Publisher, versions 7.6.0.0.0, 8.2.0.0.0
- Patch Availability Document: Oracle Analytics
- Affected Products and Versions: Oracle Business Intelligence Enterprise Edition, versions 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- Patch Availability Document: Oracle Analytics
- Affected Products and Versions: Oracle Business Process Management Suite, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Cloud Native Session Border Controller, version 25.1.0
- Patch Availability Document: Oracle Cloud Native Session Border Controller
- Affected Products and Versions: Oracle Coherence, versions 12.2.1.4.0, 14.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Commerce Guided Search, version 11.4.0
- Patch Availability Document: Oracle Commerce
- Affected Products and Versions: Oracle Commerce Platform, version 11.4.0
- Patch Availability Document: Oracle Commerce
- Affected Products and Versions: Oracle Communications ASAP, versions 7.4.0, 7.4.1
- Patch Availability Document: Oracle Communications ASAP
- Affected Products and Versions: Oracle Communications Billing and Revenue Management, versions 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- Patch Availability Document: Oracle Communications Billing and Revenue Management
- Affected Products and Versions: Oracle Communications BRM - Elastic Charging Engine, versions 15.0.0.0, 15.0.1.0, 15.1.0.0
- Patch Availability Document: Oracle Communications BRM - Elastic Charging Engine
- Affected Products and Versions: Oracle Communications Diameter Signaling Router, versions 9.0.0, 9.0.1, 9.1.0
- Patch Availability Document: Oracle Communications Diameter Signaling Router
- Affected Products and Versions: Oracle Communications Element Manager, versions 9.0.0-9.0.4
- Patch Availability Document: Oracle Communications Element Manager
- Affected Products and Versions: Oracle Communications IP Service Activator, version 7.5.0
- Patch Availability Document: Oracle Communications IP Service Activator
- Affected Products and Versions: Oracle Communications Network Analytics Data Director, versions 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- Patch Availability Document: Oracle Communications Network Analytics Data Director
- Affected Products and Versions: Oracle Communications Network Integrity, versions 7.3.6, 7.4.0, 7.5.0, 8.0.0
- Patch Availability Document: Oracle Communications Network Integrity
- Affected Products and Versions: Oracle Communications Operations Monitor, versions 5.2, 6.0, 6.1
- Patch Availability Document: Oracle Communications Operations Monitor
- Affected Products and Versions: Oracle Communications Order and Service Management, versions 7.5.0, 8.0.0
- Patch Availability Document: Oracle Communications Order and Service Management
- Affected Products and Versions: Oracle Communications Policy Management, version 15.0.0.0
- Patch Availability Document: Oracle Communications Policy Management
- Affected Products and Versions: Oracle Communications Pricing Design Center, versions 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- Patch Availability Document: Oracle Communications Pricing Design Center
- Affected Products and Versions: Oracle Communications Session Border Controller, versions 9.3.0, 10.0.0
- Patch Availability Document: Oracle Communications Session Border Controller
- Affected Products and Versions: Oracle Communications Session Report Manager, versions 9.0.0-9.0.4
- Patch Availability Document: Oracle Communications Session Report Manager
- Affected Products and Versions: Oracle Communications Unified Assurance, versions 6.1.0-6.1.1
- Patch Availability Document: Oracle Communications Unified Assurance
- Affected Products and Versions: Oracle Communications Unified Inventory Management, versions 7.7.0, 7.8.0, 8.0.0
- Patch Availability Document: Oracle Communications Unified Inventory Management
- Affected Products and Versions: Oracle Data Integrator, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Database Server, versions 19.3-19.29, 21.3-21.20, 23.4.0-23.26.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle E-Business Suite, versions 12.2.3-12.2.15
- Patch Availability Document: Oracle E-Business Suite
- Affected Products and Versions: Oracle Enterprise Communications Broker, versions 4.1.0, 4.2.0, 5.0.0
- Patch Availability Document: Oracle Enterprise Communications Broker
- Affected Products and Versions: Oracle Enterprise Manager Base Platform, versions 13.5, 24.1
- Patch Availability Document: Oracle Enterprise Manager
- Affected Products and Versions: Oracle Essbase, version 21.8.0.0.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Financial Services Compliance Studio, version 2.6.0
- Patch Availability Document: Oracle Financial Services Compliance Studio
- Affected Products and Versions: Oracle Financial Services Model Management and Governance, version 8.1.3.2
- Patch Availability Document: Oracle Financial Services Model Management and Governance
- Affected Products and Versions: Oracle FLEXCUBE Investor Servicing, versions 14.5.0.15.0, 14.7.0.8.0, 14.8.0.1.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle FLEXCUBE Universal Banking, versions 14.0.0.0.0-14.8.0.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Fusion Middleware, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Global Lifecycle Management NextGen OUI Framework, version 15.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle GoldenGate, versions 19.1.0.0.0-19.29.0.0.251021, 21.3-21.20, 23.4-23.10
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Big Data and Application Adapters, versions 19.1.0.0.0-19.1.0.0.20, 21.3-21.20, 23.4-23.10
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Stream Analytics, versions 19.1.0.0.0-19.1.0.0.13
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Studio, versions 23.8.0-23.9.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Veridata, versions 12.2.1.4.0-12.2.1.4.250531
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GraalVM Enterprise Edition, version 21.3.16
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle GraalVM for JDK, versions 17.0.17, 21.0.9
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle Graph Server and Client, versions 24.4.4, 25.4.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Health Sciences Information Manager, version 4.0.0
- Patch Availability Document: HealthCare Applications
- Affected Products and Versions: Oracle Healthcare Data Repository, versions 8.2.0.5, 8.2.0.6
- Patch Availability Document: HealthCare Applications
- Affected Products and Versions: Oracle Healthcare Master Person Index, versions 5.0.0.0-5.0.9.5
- Patch Availability Document: HealthCare Applications
- Affected Products and Versions: Oracle Hospitality OPERA 5 Property Services, versions 5.6.19, 5.6.25, 5.6.26, 5.6.27
- Patch Availability Document: Oracle Hospitality OPERA 5 Property Services
- Affected Products and Versions: Oracle HTTP Server, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Hyperion Calculation Manager, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Financial Close Management, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Financial Management, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Financial Reporting, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Infrastructure Technology, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Planning, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Profitability and Cost Management, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Identity Manager, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Identity Manager Connector, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Insurance Policy Administration J2EE, versions 11.3.1-12.0.6
- Patch Availability Document: Oracle Insurance Applications
- Affected Products and Versions: Oracle Java SE, versions 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle JDK Mission Control, version 9.1.1
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle Key Vault, versions 21.1.0.0.0-21.11.0.0.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Life Sciences Central Coding, version 7.0.1.0
- Patch Availability Document: Health Sciences
- Affected Products and Versions: Oracle Life Sciences Central Designer, version 7.0.1.0
- Patch Availability Document: Health Sciences
- Affected Products and Versions: Oracle Managed File Transfer, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Middleware Common Libraries and Tools, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle NoSQL Database, versions 1.5, 1.6
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Outside In Technology, versions 8.5.7, 8.5.8
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Planning and Budgeting Cloud Service, version 25.4.7
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Retail Advanced Inventory Planning, versions 15.0.3, 16.0.3
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Allocation, versions 15.0.3, 16.0.3
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Bulk Data Integration, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Financial Integration, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Fiscal Management, version 14.2
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Integration Bus, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Predictive Application Server, versions 15.0.3, 16.0.3
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Service Backbone, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Xstore Office, version 25.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Xstore Point of Service, versions 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Secure Backup, versions 19.1.0.0.0-19.1.0.1.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Security Service, version 12.2.1.4.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Service Bus, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle SOA Suite, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Solaris, versions 10, 11
- Patch Availability Document: Systems
- Affected Products and Versions: Oracle TimesTen In-Memory Database, versions 22.1.1.1.0-22.1.1.35.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Unified Directory, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Utilities Application Framework, versions 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
- Patch Availability Document: Oracle Utilities Applications
- Affected Products and Versions: Oracle Utilities Network Management System, versions 2.5.0.1.16, 2.5.0.2.10, 2.6.0.1.9, 2.6.0.2.5
- Patch Availability Document: Oracle Utilities Applications
- Affected Products and Versions: Oracle Utilities Testing Accelerator, versions 7.0.0.0.6, 7.0.0.1.4, 25.4.0.0.1
- Patch Availability Document: Oracle Utilities Applications
- Affected Products and Versions: Oracle VM VirtualBox, versions 7.1.14, 7.2.4
- Patch Availability Document: Virtualization
- Affected Products and Versions: Oracle WebCenter Enterprise Capture, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle WebCenter Sites, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle WebLogic Server, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.4.0, 14.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Zero Data Loss Recovery Appliance Software, versions 23.1.0-23.1.202509
- Patch Availability Document: Database
- Affected Products and Versions: Oracle ZFS Storage Appliance Kit, version 8.8
- Patch Availability Document: Systems
- Affected Products and Versions: PeopleSoft Enterprise HCM Human Resources, version 9.2
- Patch Availability Document: PeopleSoft
- Affected Products and Versions: PeopleSoft Enterprise PeopleTools, versions 8.60, 8.61, 8.62
- Patch Availability Document: PeopleSoft
- Affected Products and Versions: PeopleSoft Enterprise SCM Purchasing, version 9.2
- Patch Availability Document: PeopleSoft
- Affected Products and Versions: Primavera Gateway, versions 21.12.0-21.12.16
- Patch Availability Document: Oracle Construction and Engineering Suite
- Affected Products and Versions: Primavera P6 Enterprise Project Portfolio Management, versions 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0
- Patch Availability Document: Oracle Construction and Engineering Suite
- Affected Products and Versions: Primavera Unifier, versions 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- Patch Availability Document: Oracle Construction and Engineering Suite
- Affected Products and Versions: Service Delivery Platform, version 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Siebel Applications, versions 17.0-25.11
- Patch Availability Document: Siebel
Risk Matrix Content
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE ID. A vulnerability that affects multiple products will appear with the same CVE ID in all risk matrices.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about conditions required to exploit the vulnerability and the potential impact of a successful exploit. Oracle provides this information so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Third party component vulnerabilities that are deemed not exploitable in the context of their inclusion in an Oracle product are listed, with VEX justifications, below the respective Oracle product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected.
Workarounds
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Skipped Critical Patch Updates
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Critical Patch Update Supported Products and Versions
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy that further supplements the Lifetime Support Policy as explained in My Oracle Support Note KB65129. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
Credit Statement
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
- Akira Hachiya: CVE-2026-21939
- Alexander Kornbrust of Red Database Security: CVE-2026-21958, CVE-2026-21977
- Anton Fedorov: CVE-2026-21968
- Ao Wang of Southeast University: CVE-2026-21928, CVE-2026-21982
- Eangly Roeurn: CVE-2026-21978
- fstmpr: CVE-2026-21989, CVE-2026-21990
- haidv35 (Dinh Viet Hai) of Viettel Cyber Security: CVE-2026-21944
- Ireneusz Pastusiak: CVE-2026-21945
- Jingzhou Fu of WingTecher Lab of Tsinghua University: CVE-2026-21949, CVE-2026-21950
- Kanika Jalal: CVE-2026-21931
- Kritnarong Samertung: CVE-2026-21973
- Kush Jijania: CVE-2026-21924
- Maxime Escourbiac of Michelin CERT: CVE-2026-21959, CVE-2026-21960
- Mingijung of WebSec Lab: CVE-2026-21932
- Mohammed Ba Rashed: CVE-2026-21986
- Muhammad Zeeshan (Xib3rR4dAr): CVE-2026-21943
- NiNi (terrynini38514) from DEVCORE Research Team working with Trend Micro Zero Day Initiative: CVE-2026-21957
- Patrick Murphy of Lockheed Martin Red Team: CVE-2026-21922, CVE-2026-21979
- Phudq of Viettel Cybersecurity working with Trend Zero Day Initiative: CVE-2026-21985
- PwC HK Darklab: CVE-2026-21966, CVE-2026-21967
- Ryan Brothers: CVE-2026-21948
- Ved Prabhu: CVE-2026-21931
- Viettel Cyber Security working with Trend Micro Zero Day Initiative: CVE-2026-21963
- VMBreakers (Gangmin Kim, Sangbin Kim, Un3xploitable) working with Trend Micro Zero Day Initiative: CVE-2026-21955, CVE-2026-21956, CVE-2026-21984
- Xiaobye (xiaobye_tw) of DEVCORE Research Team working with Trend Micro Zero Day Initiative: CVE-2026-21983
- Yassine Bengana of Michelin CERT: CVE-2026-21959, CVE-2026-21960
- Yuhao Jiang: CVE-2026-21981
- Zhenghao Li of ISCAS: CVE-2026-21987, CVE-2026-21988
- Zhihui Chen: CVE-2026-21933
- Zhiyong Wu of WingTecher Lab of Tsinghua University: CVE-2026-21949, CVE-2026-21950
- Zpt_dxpn of Pentest Team Viettel Cyber Security: CVE-2026-21969
Security-In-Depth Contributors
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
- Akira Hachiya
- Jan Starke
- Karan Bamal
On-Line Presence Security Contributors
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
- Abdulhadi Arif Alshammari
- Ammar Albarakati
- Avanish Pathak
- Ayşenur Demiral
- Bryon Wolcott
- Emad Al-Mousa of Saudi Aramco's Upstream Digital Center (UDC) [2 reports]
- Garreth Kelsey
- Gouri Sankar A
- Jiehao Zhang (Water1sec)
- Keisuke Inoue of LAC Co., Ltd.
- Kristen Duchrow
- Mike Khytko of Alerts Bar Inc
- Pherry874
- Reiji Nishimura of LAC Co., Ltd.
- Richard Fichtner
- Surya Arigela
- Yosuke Totani of LAC Co., Ltd
Critical Patch Update Schedule
Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:
- 21 April 2026
- 21 July 2026
- 20 October 2026
- 19 January 2027
References
- Oracle Critical Patch Updates, Security Alerts and Bulletins
- Critical Patch Update - January 2026 Documentation Map
- Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions
- Risk Matrix Definitions
- Use of Common Vulnerability Scoring System (CVSS) by Oracle
- English text version of the risk matrices
- CSAF JSON version of the risk matrices
- Map of CVE to Advisory/Alert
- Oracle Lifetime support Policy
- JEP 290 Reference Blocklist Filter
Modification History
| Date | Note |
|---|---|
| 2026-January-20 | Rev 1. Initial Release. |
Oracle Database Products Risk Matrices
This Critical Patch Update contains 18 new security patches for Oracle Database Products divided as follows:
- 7 new security patches for Oracle Database Products
- 1 new security patch for Oracle APEX
- 1 new security patch for Oracle Essbase
- 5 new security patches for Oracle GoldenGate
- 1 new security patch for Oracle Graph Server and Client
- No new security patches for Oracle Key Vault, but third party patches are provided
- 1 new security patch for Oracle NoSQL Database
- 1 new security patch for Oracle Secure Backup
- No new security patches for Oracle TimesTen In-Memory Database, but third party patches are provided
- 1 new security patch for Oracle Zero Data Loss Recovery Appliance
Oracle Database Server Risk Matrix
This Critical Patch Update contains 7 new security patches, plus additional third party patches noted below, for Oracle Database Products. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Component: AttackVector
- Package and/or Privilege Required: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-12383
- Component: Fleet Patching and Provisioning (Eclipse Jersey)
- Package and/or Privilege Required: None
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 23.4.0-23.26.0
- CVE ID: CVE-2026-21939
- Component: SQLcl
- Package and/or Privilege Required: None
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.0
- Supported Versions Affected: Local
- Notes: High
- None
- Required
- Un-changed
- High
- High
- High
- 23.4.0-23.26.0
- CVE ID: CVE-2025-8194
- Component: RDBMS (Python)
- Package and/or Privilege Required: Authenticated User
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.7
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Un-changed
- High
- High
- High
- 21.3-21.20, 23.4.0-23.26.0
- CVE ID: CVE-2025-67735
- Component: Oracle Graal Development Kit for Micronaut (Nimbus JOSE+JWT)
- Package and/or Privilege Required: Authenticated User
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 19.3-19.29, 23.4.0-23.26.0
- CVE ID: CVE-2026-21975
- Component: Java VM
- Package and/or Privilege Required: Authenticated User
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.5
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- High
- 19.3-19.29, 21.3-21.20
- CVE ID: CVE-2025-61755
- Component: GraalVM Multilingual Engine
- Package and/or Privilege Required: Create Session
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- Low
- None
- None
- 21.3-21.20, 23.4.0-23.26.0
- CVE ID: CVE-2025-54874
- Component: Oracle Spatial and Graph (OpenJPEG)
- Package and/or Privilege Required: None
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- Required
- Un-changed
- None
- None
- Low
- 23.4.0-23.26.0
Additional CVEs addressed are:
- The patch for CVE-2025-8194 also addresses CVE-2025-13836, CVE-2025-13837, CVE-2025-6069, CVE-2025-6075, CVE-2025-8291, and CVE-2025-8869.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle Database (Apache Tomcat): CVE-2025-61795 and CVE-2025-55754 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle Database Security (OpenSSL): CVE-2025-9230, CVE-2025-9231 and CVE-2025-9232 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Database Server Client-Only Installations
- The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2026-21939.
Oracle APEX Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle APEX. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21931
- Product: Oracle APEX Sample Applications
- Component: Brookstrut Sample App
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- Required
- Changed
- Low
- Low
- None
- 23.2.0, 23.2.1, 24.1.0, 24.2.0, 24.2.1
Oracle Essbase Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Essbase. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66566
- Product: Oracle Essbase
- Component: Essbase Web Platform (lz4-java)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 21.8.0.0.0
Oracle GoldenGate Risk Matrix
This Critical Patch Update contains 5 new security patches, plus additional third party patches noted below, for Oracle GoldenGate. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-59250
- Product: Oracle GoldenGate Big Data and Application Adapters
- Component: Java Delivery (JDBC Driver for SQL Server)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- High
- High
- None
- 21.3-21.20, 23.4-23.10
- CVE ID: CVE-2025-59419
- Product: Oracle GoldenGate Big Data and Application Adapters
- Component: Java Delivery (Netty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 21.3-21.20, 23.4-23.10
- CVE ID: CVE-2025-55039
- Product: Oracle GoldenGate Stream Analytics
- Component: General (Apache Spark)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 19.1.0.0.0-19.1.0.0.11
- CVE ID: CVE-2025-68161
- Product: Oracle GoldenGate Big Data and Application Adapters
- Component: Third Party (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 19.1.0.0.0-19.1.0.0.20, 21.3-21.20, 23.4-23.10
- CVE ID: CVE-2025-48924
- Product: Oracle GoldenGate Stream Analytics
- Component: General (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- Low
- 19.1.0.0.0-19.1.0.0.11
Additional CVEs addressed are:
- The patch for CVE-2025-59419 also addresses CVE-2025-58056 and CVE-2025-58057.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle GoldenGate
- Embedded Web UI for Services (Axios): CVE-2025-58754 and CVE-2025-27152 [VEX Justification: vulnerable_code_not_in_execute_path].
- Libraries (BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Big Data and Application Adapters
- Java Delivery (Apache Commons IO): CVE-2024-47554 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Stream Analytics
- General (urllib3): CVE-2025-66418 and CVE-2025-66471 [VEX Justification: vulnerable_code_not_in_execute_path].
- General (Requests): CVE-2024-35195 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Studio
- OGG Orchestration Service (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].
- OGG Orchestration Service (logback): CVE-2023-6378 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Veridata
- Third Party (Apache Commons FileUpload): CVE-2025-48976 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Graph Server and Client Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Graph Server and Client. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-61795
- Product: Oracle Graph Server and Client
- Component: Packaging (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 24.4.4, 25.4.0
Oracle Key Vault Risk Matrix
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Key Vault. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Key Vault. The English text form of this Risk Matrix can be found here.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle Key Vault
- General Server/Appliance: CVE-2026-21958 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
Oracle NoSQL Database Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle NoSQL Database. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-30065
- Product: Oracle NoSQL Database
- Component: Administration (Apache Parquet Java)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.0
- Supported Versions Affected: Local
- Notes: High
- Low
- None
- Un-changed
- High
- High
- High
- 1.5, 1.6
Oracle Secure Backup Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-65082
- Product: Oracle Secure Backup
- Component: Oracle Secure Backup (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 19.1.0.0.0-19.1.0.1.0
Additional CVEs addressed are:
- The patch for CVE-2025-65082 also addresses CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, and CVE-2025-66200.
Oracle TimesTen In-Memory Database Risk Matrix
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle TimesTen In-Memory Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle TimesTen In-Memory Database. The English text form of this Risk Matrix can be found here.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle TimesTen In-Memory Database
- Kubernetes Operator (Golang Go): CVE-2025-47910 [VEX Justification: vulnerable_code_not_in_execute_path].
- Install (BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Zero Data Loss Recovery Appliance Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Zero Data Loss Recovery Appliance. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21977
- Product: Oracle Zero Data Loss Recovery Appliance Software
- Component: Security
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- Low
- None
- None
- 23.1.0-23.1.202509
Oracle Commerce Risk Matrix
This Critical Patch Update contains 7 new security patches for Oracle Commerce. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: Oracle Commerce Guided Search
- Component: Workbench (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 11.4.0
- CVE ID: CVE-2025-50059
- Product: Oracle Commerce Guided Search
- Component: Content Acquisition System, Workbench, Endeca Application Controller (Oracle Java SE)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- None
- None
- 11.4.0
- CVE ID: CVE-2025-41249
- Product: Oracle Commerce Guided Search
- Component: Content Acquisition System, Workbench, Endeca Application Controller (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 11.4.0
- CVE ID: CVE-2025-9086
- Product: Oracle Commerce Guided Search
- Component: MDEX, Forge (curl)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 11.4.0
- CVE ID: CVE-2025-41249
- Product: Oracle Commerce Platform
- Component: Dynamo Application Framework (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 11.4.0
- CVE ID: CVE-2025-61795
- Product: Oracle Commerce Guided Search
- Component: Content Acquisition System, Workbench, Endeca Application Controller (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 11.4.0
- CVE ID: CVE-2025-48924
- Product: Oracle Commerce Platform
- Component: Dynamo Application Framework (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.4.0
Additional CVEs addressed are:
- The patch for CVE-2025-41249 also addresses CVE-2025-41242.
- The patch for CVE-2025-9086 also addresses CVE-2025-10148.
Oracle Communications Risk Matrix
This Critical Patch Update contains 56 new security patches for Oracle Communications. 34 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: Oracle Communications Order and Service Management
- Component: Security (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 7.5.0, 8.0.0
- CVE ID: CVE-2025-49844
- Product: Oracle Communications Operations Monitor
- Component: Infrastructure (valkey)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.9
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Changed
- High
- High
- High
- 5.2
- CVE ID: CVE-2025-48734
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 15.0.0.0
- CVE ID: CVE-2025-9900
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (LibTIFF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- High
- High
- High
- 15.0.0.0
- CVE ID: CVE-2025-66516
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Changed
- High
- High
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-32990
- Product: Oracle Communications Network Analytics Data Director
- Component: Platform (GnuTLS)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- High
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200
- CVE ID: CVE-2025-32990
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (GnuTLS)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- High
- 15.0.0.0
- CVE ID: CVE-2025-5987
- Product: Oracle Enterprise Communications Broker
- Component: Routing (libssh)
- Protocol: SSH
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 4.2.0, 5.0.0
- CVE ID: CVE-2025-58057
- Product: Oracle Cloud Native Session Border Controller
- Component: Security (Netty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 25.1.0
- CVE ID: CVE-2025-48060
- Product: Oracle Cloud Native Session Border Controller
- Component: Third Party (jq)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 25.1.0
- CVE ID: CVE-2025-41249
- Product: Oracle Communications BRM - Elastic Charging Engine
- Component: Security (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 15.1.0.0
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Diameter Signaling Router
- Component: Automated Test Suite (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0, 9.0.1, 9.1.0
- CVE ID: CVE-2025-27533
- Product: Oracle Communications Element Manager
- Component: Third Party (Apache ActiveMQ)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-48976
- Product: Oracle Communications Element Manager
- Component: Third Party (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-59375
- Product: Oracle Communications Network Analytics Data Director
- Component: Third Party (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- CVE ID: CVE-2025-41249
- Product: Oracle Communications Network Integrity
- Component: Platform, MSS Cartridge (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 7.3.6, 7.4.0, 7.5.0
- CVE ID: CVE-2025-66418
- Product: Oracle Communications Operations Monitor
- Component: Mediation Engine (urllib3)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 5.2, 6.0, 6.1
- CVE ID: CVE-2025-48976
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 15.0.0.0
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Session Border Controller
- Component: Routing (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.3.0, 10.0.0
- CVE ID: CVE-2025-27533
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache ActiveMQ)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-48976
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-46727
- Product: Oracle Communications Unified Assurance
- Component: Core (Rack)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Unified Inventory Management
- Component: Security (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.7.0, 7.8.0, 8.0.0
- CVE ID: CVE-2025-66418
- Product: Oracle Communications Unified Inventory Management
- Component: Security (urllib3)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.7.0, 7.8.0, 8.0.0
- CVE ID: CVE-2025-8194
- Product: Oracle Enterprise Communications Broker
- Component: Routing (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 4.1.0, 4.2.0, 5.0.0
- CVE ID: CVE-2025-32988
- Product: Oracle Cloud Native Session Border Controller
- Component: Third Party (GnuTLS)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- Low
- High
- 25.1.0
- CVE ID: CVE-2025-58098
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- High
- High
- Low
- 6.1.0-6.1.1
- CVE ID: CVE-2025-54571
- Product: Oracle Communications Unified Assurance
- Component: Core (ModSecurity)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-26333
- Product: Oracle Communications Billing and Revenue Management
- Component: Platform (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- CVE ID: CVE-2025-65018
- Product: Oracle Communications Unified Assurance
- Component: Core (libpng)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- None
- High
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-25193
- Product: Oracle Communications BRM - Elastic Charging Engine
- Component: Security (Netty)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.5
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 15.0.0.0, 15.0.1.0
- CVE ID: CVE-2025-68161
- Product: Oracle Communications IP Service Activator
- Component: Logging (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 7.5.0
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Network Analytics Data Director
- Component: Security (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 15.0.0.0
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Pricing Design Center
- Component: On-premise Deployment (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Unified Assurance
- Component: Core (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-48924
- Product: Oracle Cloud Native Session Border Controller
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 25.1.0
- CVE ID: CVE-2025-48924
- Product: Oracle Communications ASAP
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.4.0, 7.4.1
- CVE ID: CVE-2025-48924
- Product: Oracle Communications Element Manager
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 9.0.0-9.0.4
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Element Manager
- Component: Web UI (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-48924
- Product: Oracle Communications IP Service Activator
- Component: System (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.5.0
- CVE ID: CVE-2025-48924
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 15.0.0.0
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 15.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 9.0.0-9.0.4
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2024-12133
- Product: Oracle Communications Unified Assurance
- Component: Core (Libtasn1)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 6.1.0-6.1.1
- CVE ID: CVE-2025-5115
- Product: Oracle Communications Unified Assurance
- Component: Core (Eclipse Jetty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-55163
- Product: Oracle Communications Unified Assurance
- Component: Core (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- High
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-68161
- Product: Oracle Communications Network Integrity
- Component: Logging (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.8
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- None
- 7.3.6, 7.4.0, 7.5.0, 8.0.0
- CVE ID: CVE-2025-59375
- Product: Oracle Communications Unified Assurance
- Component: Core (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.5
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Unified Assurance
- Component: Core (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.5
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2024-46901
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache Subversion)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- Low
- 6.1.0-6.1.1
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.2
- Supported Versions Affected: Network
- Notes: High
- High
- Required
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-55163
- Product: Oracle Communications Network Analytics Data Director
- Component: Security (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- Low
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- CVE ID: CVE-2025-64718
- Product: Oracle Communications Unified Assurance
- Component: Core (node-forge)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- Low
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-8916
- Product: Oracle Communications Unified Assurance
- Component: Core (Bouncy Castle Java Library)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- Low
- 6.1.0-6.1.1
Additional CVEs addressed are:
- The patch for CVE-2025-64718 also addresses CVE-2025-12816.
- The patch for CVE-2025-48060 also addresses CVE-2024-23337.
- The patch for CVE-2025-66418 also addresses CVE-2025-66471.
- The patch for CVE-2024-46901 also addresses CVE-2024-45720.
- The patch for CVE-2025-9900 also addresses CVE-2025-8176, CVE-2025-8177, and CVE-2025-8961.
- The patch for CVE-2025-5318 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, CVE-2025-5449, and CVE-2025-5987.
- The patch for CVE-2025-32990 also addresses CVE-2025-32988, CVE-2025-32989, CVE-2025-5318, and CVE-2025-6395.
- The patch for CVE-2025-41249 also addresses CVE-2025-22233, CVE-2025-41234, and CVE-2025-41242.
- The patch for CVE-2025-65018 also addresses CVE-2025-64505, CVE-2025-64506, and CVE-2025-64720.
- The patch for CVE-2025-58098 also addresses CVE-2025-55753, CVE-2025-59775, CVE-2025-65082, and CVE-2025-66200.
- The patch for CVE-2025-55163 also addresses CVE-2025-58056.
- The patch for CVE-2025-8194 also addresses CVE-2025-6069.
- The patch for CVE-2025-5987 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, and CVE-2025-5449.
- The patch for CVE-2025-49844 also addresses CVE-2025-46817, CVE-2025-46818, and CVE-2025-46819.
Oracle Construction and Engineering Risk Matrix
This Critical Patch Update contains 8 new security patches for Oracle Construction and Engineering. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2021-43113
- Product: Primavera Unifier
- Component: Reports (iTextPDF)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- CVE ID: CVE-2025-66516
- Product: Primavera Unifier
- Component: Integration (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- Low
- 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- CVE ID: CVE-2025-41249
- Product: Primavera Gateway
- Component: Admin (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 21.12.0-21.12.16
- CVE ID: CVE-2025-41249
- Product: Primavera Unifier
- Component: Integration (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- CVE ID: CVE-2025-48795
- Product: Primavera P6 Enterprise Project Portfolio Management
- Component: Integrators (Apache CXF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.6
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- Low
- 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0
- CVE ID: CVE-2025-68161
- Product: Primavera Gateway
- Component: Admin (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 21.12.0-21.12.16
- CVE ID: CVE-2025-26791
- Product: Primavera P6 Enterprise Project Portfolio Management
- Component: Team Member (DOMPurify)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.9
- Supported Versions Affected: Local
- Notes: High
- Low
- Required
- Changed
- Low
- Low
- None
- 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0
- CVE ID: CVE-2025-48734
- Product: Primavera P6 Enterprise Project Portfolio Management
- Component: Web Access (Apache Commons BeanUtils)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.7
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- None
- None
- 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.6.0
Additional CVEs addressed are:
- The patch for CVE-2025-41249 also addresses CVE-2025-41242.
Oracle E-Business Suite Risk Matrix
This Critical Patch Update contains 8 new security patches for Oracle E-Business Suite. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the January 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (January 2026), My Oracle Support Note KA923.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-48734
- Product: Oracle Field Service
- Component: HTML Dispatch Center (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2025-48734
- Product: Oracle Human Resources
- Component: iRecruitment (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2025-48734
- Product: Oracle Succession planning
- Component: Suitability Analyzer (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2025-48734
- Product: Oracle Time and Labor
- Component: Core (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21960
- Product: Oracle Applications DBA
- Component: Java utils
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- High
- None
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21943
- Product: Oracle Scripting
- Component: Scripting Admin
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21972
- Product: Oracle Configurator
- Component: User Interface
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- None
- None
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21959
- Product: Oracle Workflow
- Component: Workflow Loader
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- None
- None
- 12.2.3-12.2.15
Oracle Enterprise Manager Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the January 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2026 Patch Availability Document for Oracle Products, My Oracle Support Note CPU6.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2024-13009
- Product: Oracle Enterprise Manager Base Platform
- Component: Gateway (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 24.1
- CVE ID: CVE-2024-13009
- Product: Oracle Enterprise Manager Base Platform
- Component: Oracle Enterprise Manager Base Platform - Agent Next Gen (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 13.5, 24.1
- CVE ID: CVE-2025-48924
- Product: Oracle Application Testing Suite
- Component: Load Testing for Web Apps (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 13.3.0.1
- CVE ID: CVE-2025-48924
- Product: Oracle Enterprise Manager Base Platform
- Component: Agent Next Gen (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 13.5, 24.1
Oracle Financial Services Applications Risk Matrix
This Critical Patch Update contains 38 new security patches for Oracle Financial Services Applications. 33 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Branch
- Component: Reports (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Cash Management
- Component: Accessibility (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Corporate Lending Process Management
- Component: Base (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Liquidity Management
- Component: Common Core (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Supply Chain Finance
- Component: Security (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-48734
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48734
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2026-21973
- Product: Oracle FLEXCUBE Investor Servicing
- Component: Security Management System
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- None
- 14.5.0.15.0, 14.7.0.8.0, 14.8.0.1.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Branch
- Component: Reports (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- CVE ID: CVE-2025-48976
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-27817
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Kafka)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Cash Management
- Component: Accessibility (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Banking Cash Management
- Component: Accessibility (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-9230
- Product: Oracle Banking Cash Management
- Component: Accessibility (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Corporate Lending Process Management
- Component: Base (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- CVE ID: CVE-2025-48976
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-27817
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Kafka)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-9230
- Product: Oracle Banking Liquidity Management
- Component: Common Core (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Supply Chain Finance
- Component: Security (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Banking Supply Chain Finance
- Component: Security (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-9230
- Product: Oracle Banking Supply Chain Finance
- Component: Security (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle Financial Services Compliance Studio
- Component: Reports (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 2.6.0
- CVE ID: CVE-2025-66418
- Product: Oracle Financial Services Compliance Studio
- Component: Reports (urllib3)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 2.6.0
- CVE ID: CVE-2025-41249
- Product: Oracle Financial Services Model Management and Governance
- Component: Installer (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 8.1.3.2
- CVE ID: CVE-2025-41248
- Product: Oracle Financial Services Model Management and Governance
- Component: Installer (Spring Security)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 8.1.3.2
- CVE ID: CVE-2025-22228
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Spring Security)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 14.5.0.14.0
- CVE ID: CVE-2026-21978
- Product: Oracle FLEXCUBE Universal Banking
- Component: Relationship Pricing
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- None
- None
- 14.0.0.0.0-14.8.0.0.0
- CVE ID: CVE-2025-48795
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache CXF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.6
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48795
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache CXF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.6
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Branch
- Component: Reports (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Corporate Lending Process Management
- Component: Base (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Supply Chain Finance
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-61795
- Product: Oracle Financial Services Model Management and Governance
- Component: Installer (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 8.1.3.2
- CVE ID: CVE-2025-48924
- Product: Oracle Insurance Policy Administration J2EE
- Component: Architecture (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.3.1-12.0.6
Additional CVEs addressed are:
- The patch for CVE-2025-66418 also addresses CVE-2025-66471.
- The patch for CVE-2025-27817 also addresses CVE-2025-27818.
- The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
- The patch for CVE-2025-9230 also addresses CVE-2025-9231 and CVE-2025-9232.
Oracle Fusion Middleware Risk Matrix
This Critical Patch Update contains 51 new security patches for Oracle Fusion Middleware. 47 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
To get the full list of current and previously released Critical Patch Update patches for Oracle Fusion Middleware products, refer to My Oracle Support Doc ID KA1182.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: Oracle Business Process Management Suite
- Component: Runtime Engine (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2026-21962
- Product: Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in
- Component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- None
- 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0
- See Note 1
- CVE ID: CVE-2025-66516
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-54988
- Product: Oracle Business Process Management Suite
- Component: Oracle Business Rules (Apache Commons Compress)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-4949
- Product: Oracle Data Integrator
- Component: Security (Eclipse JGit)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-4949
- Product: Oracle Fusion Middleware
- Component: Oracle Database Client for Fusion Middleware (Eclipse JGit)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-54874
- Product: Oracle Outside In Technology
- Component: Core (OpenJPEG)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 8.5.7, 8.5.8
- CVE ID: CVE-2025-49796
- Product: Oracle HTTP Server
- Component: Core (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-23048
- Product: Oracle HTTP Server
- Component: SSL Module (Apache HTTP Server)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- None
- 14.1.2.0.0
- CVE ID: CVE-2024-56406
- Product: Oracle Fusion Middleware
- Component: Third Party (Perl)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2022-41342
- Product: Oracle Access Manager
- Component: Webserver Plugin (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0
- CVE ID: CVE-2022-41342
- Product: Oracle Fusion Middleware
- Component: Dynamic Monitoring Service, Oracle Notification Service, libiau (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0
- See Note 2
- CVE ID: CVE-2022-41342
- Product: Oracle HTTP Server
- Component: Core (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0
- See Note 2
- CVE ID: CVE-2022-41342
- Product: Oracle Weblogic Server Proxy Plug-in
- Component: Oracle Weblogic Server Proxy Plug-in for Apache HTTP Server (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0, 14.1.1.0.0
- See Note 2
- CVE ID: CVE-2025-48976
- Product: Oracle Business Process Management Suite
- Component: Composer (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Coherence
- Component: Centralized Third Party Jars (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Data Integrator
- Component: Runtime Java agent (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0
- CVE ID: CVE-2024-42516
- Product: Oracle HTTP Server
- Component: Core (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-59375
- Product: Oracle HTTP Server
- Component: Core (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2024-43204
- Product: Oracle HTTP Server
- Component: mod_proxy (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-54571
- Product: Oracle HTTP Server
- Component: mod_security (ModSecurity)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2024-47252
- Product: Oracle HTTP Server
- Component: SSL module (Apache HTTP Server)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle Identity Manager
- Component: Installer (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-41249
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-59375
- Product: Oracle Outside In Technology
- Component: Core (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.5.7, 8.5.8
- CVE ID: CVE-2025-48976
- Product: Oracle Service Bus
- Component: Core (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0
- CVE ID: CVE-2025-48976
- Product: Oracle SOA Suite
- Component: Rest Converters (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-43967
- Product: Oracle WebCenter Enterprise Capture
- Component: Client Bundle (libheif)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-41248
- Product: Oracle WebCenter Sites
- Component: Core (Spring Security)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 14.1.2.0.0
- CVE ID: CVE-2025-48976
- Product: Oracle WebLogic Server
- Component: Centralized Third Party Jars (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.1.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle WebLogic Server
- Component: Core (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0
- CVE ID: CVE-2025-55163
- Product: Service Delivery Platform
- Component: Messaging Enabler (Netty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-12383
- Product: Oracle Global Lifecycle Management NextGen OUI Framework
- Component: NextGen Installer (Eclipse Jersey)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 15.1.1.0.0, 15.1.1.0.0
- CVE ID: CVE-2025-12383
- Product: Oracle WebLogic Server
- Component: Centralized Third Party Jars (Eclipse Jersey)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0
- CVE ID: CVE-2024-13009
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 14.1.2.0.0
- CVE ID: CVE-2024-13009
- Product: Oracle Unified Directory
- Component: Core (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-26333
- Product: Oracle Fusion Middleware
- Component: Oracle Database Client for Fusion Middleware (BSAFE Crypto-J)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 14.1.2.0.0
- CVE ID: CVE-2025-26333
- Product: Oracle Security Service
- Component: Third Party (BSAFE Crypto-J)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0
- CVE ID: CVE-2021-45105
- Product: Oracle WebCenter Sites
- Component: Core (Apache Log4j)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0
- CVE ID: CVE-2025-53864
- Product: Oracle WebLogic Server
- Component: Centralized Third Party Jars (Nimbus JOSE+JWT)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Access Manager
- Component: Identity Store Access (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-48924
- Product: Oracle Business Process Management Suite
- Component: Composer (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.1.2.0.0
- CVE ID: CVE-2025-31672
- Product: Oracle Fusion Middleware
- Component: Oracle Database Client for Fusion Middleware (Apache POI)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- None
- 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Identity Manager
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0
- CVE ID: CVE-2025-48924
- Product: Oracle Identity Manager Connector
- Component: Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-48924
- Product: Oracle Managed File Transfer
- Component: Runtime Server (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-31672
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Apache POI)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Service Bus
- Component: Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle SOA Suite
- Component: Adapters (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle WebCenter Sites
- Component: Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2024-47554
- Product: Oracle WebLogic Server
- Component: Console (Apache Commons IO)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.1.0.0
Notes:
- Affected version for Weblogic Server Proxy Plug-in for IIS is 12.2.1.4.0 only
- Applies to LINUX only
Additional CVEs addressed are:
- The patch for CVE-2024-13009 also addresses CVE-2024-6763.
- The patch for CVE-2025-54571 also addresses CVE-2025-47947, CVE-2025-48866, and CVE-2025-52891.
- The patch for CVE-2025-66516 also addresses CVE-2025-54988.
- The patch for CVE-2024-47252 also addresses CVE-2025-49812.
- The patch for CVE-2025-43967 also addresses CVE-2025-43966.
- The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
- The patch for CVE-2022-41342 also addresses CVE-2022-40196.
Oracle Analytics Risk Matrix
This Critical Patch Update contains 8 new security patches, plus additional third party patches noted below, for Oracle Analytics. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2021-23926
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Core (Apache XMLBeans)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- High
- 8.2.0.0.0
- CVE ID: CVE-2025-52999
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Analytics Server (jackson-core)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.6.0.0.0, 8.2.0.0.0
- CVE ID: CVE-2024-57699
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Analytics Server (json-smart)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- CVE ID: CVE-2025-9230
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Platform Security (OpenSSL)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- CVE ID: CVE-2022-45047
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Core (Apache Mina SSHD)
- Protocol: SSH
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- High
- High
- 8.2.0.0.0
- CVE ID: CVE-2026-21976
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Oracle Analytics Cloud
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.1
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- None
- 7.6.0.0.0, 8.2.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Platform Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- CVE ID: CVE-2025-31672
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Analytics Server (Apache POI)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
Additional CVEs addressed are:
- The patch for CVE-2025-9230 also addresses CVE-2025-9232.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle BI Publisher
- Development Operations (Apache Tomcat): CVE-2025-41249 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle Business Intelligence Enterprise Edition
- Platform Security (Bouncy Castle Java Library): CVE-2025-8885 and CVE-2024-30171 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
Oracle Health Sciences Applications Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21980
- Product: Oracle Life Sciences Central Coding
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 7.0.1.0
- CVE ID: CVE-2026-21970
- Product: Oracle Life Sciences Central Designer
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- None
- None
- 7.0.1.0
- CVE ID: CVE-2026-21923
- Product: Oracle Life Sciences Central Designer
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 7.0.1.0
- CVE ID: CVE-2023-29081
- Product: Oracle Life Sciences Central Coding
- Component: Installation and Configuration (InstallShield)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.5
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 7.0.1.0
- CVE ID: CVE-2026-21974
- Product: Oracle Life Sciences Central Designer
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- None
- None
- 7.0.1.0
Oracle HealthCare Applications Risk Matrix
This Critical Patch Update contains 6 new security patches for Oracle HealthCare Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2024-52046
- Product: Oracle Health Sciences Information Manager
- Component: XAD-PID Change Management XPID (Apache Mina)
- Protocol: SSH
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 4.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle Healthcare Master Person Index
- Component: Master Index Data Manager (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 5.0.0.0-5.0.9.5
- CVE ID: CVE-2025-68161
- Product: Oracle Health Sciences Information Manager
- Component: Health Record Locator (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 4.0.0
- CVE ID: CVE-2025-68161
- Product: Oracle Healthcare Data Repository
- Component: FHIR Server (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 8.2.0.5, 8.2.0.6
- CVE ID: CVE-2025-68161
- Product: Oracle Healthcare Master Person Index
- Component: Master Index Data Manager (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 5.0.0.0-5.0.9.5
- CVE ID: CVE-2024-47554
- Product: Oracle Health Sciences Information Manager
- Component: Install (Apache Commons IO)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- None
- None
- Low
- 4.0.0
Oracle Hospitality Applications Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle Hospitality Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21967
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera Servlet
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- Low
- Low
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
- CVE ID: CVE-2025-48976
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
- CVE ID: CVE-2026-21966
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
- CVE ID: CVE-2025-48924
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
Oracle Hyperion Risk Matrix
This Critical Patch Update contains 12 new security patches for Oracle Hyperion. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-49796
- Product: Oracle Hyperion Infrastructure Technology
- Component: Install and Configuration (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 11.2.23
- CVE ID: CVE-2025-27363
- Product: Oracle Hyperion Financial Reporting
- Component: Install (FreeType)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 11.2.23
- CVE ID: CVE-2025-43967
- Product: Oracle Hyperion Financial Reporting
- Component: Install (libheif)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Calculation Manager
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Financial Close Management
- Component: Close Manager (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Financial Management
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Financial Reporting
- Component: Server Components (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Infrastructure Technology
- Component: Install and Configuration (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Planning
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Profitability and Cost Management
- Component: Install (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2026-21922
- Product: Oracle Planning and Budgeting Cloud Service
- Component: EPM Agent
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.2
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- None
- High
- None
- 25.04.07
- See Note 1
- CVE ID: CVE-2026-21979
- Product: Oracle Planning and Budgeting Cloud Service
- Component: EPM Agent
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.2
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- High
- None
- None
- 25.04.07
- See Note 1
Notes:
- Update EPM Agent. Please refer to Downloading the EPM Agent for more information.
Additional CVEs addressed are:
- The patch for CVE-2025-43967 also addresses CVE-2025-43966.
- The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
Oracle Java SE Risk Matrix
This Critical Patch Update contains 11 new security patches for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Low" instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.
Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-43368
- Product: Oracle Java SE
- Component: JavaFX (WebKitGTK)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- High
- High
- High
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2025-7425
- Product: Oracle Java SE
- Component: JavaFX (libxslt)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- High
- High
- High
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2026-21945
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: Security
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 1
- CVE ID: CVE-2026-21932
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: AWT, JavaFX
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- None
- High
- None
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 1
- CVE ID: CVE-2026-21933
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: Networking
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 2
- CVE ID: CVE-2025-6021
- Product: Oracle Java SE
- Component: JavaFX (libxml2)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- None
- High
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2025-12183
- Product: Oracle JDK Mission Control
- Component: Mission Control (lz4-java)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- Low
- None
- Low
- Oracle JDK Mission Control: 9.1.1
- CVE ID: CVE-2026-21925
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: RMI
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.8
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- None
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 2
- CVE ID: CVE-2025-6052
- Product: Oracle Java SE
- Component: JavaFX (glibc)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.7
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- None
- Low
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2026-21947
- Product: Oracle Java SE
- Component: JavaFX
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- None
- Low
- None
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2025-47219
- Product: Oracle Java SE
- Component: JavaFX (gstreamer)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- Low
- None
- None
- Oracle Java SE: 8u471-b50
- See Note 2
Notes:
- This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
- This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Additional CVEs addressed are:
- The patch for CVE-2025-43368 also addresses CVE-2025-43272, CVE-2025-43342, and CVE-2025-43356.
- The patch for CVE-2025-47219 also addresses CVE-2025-47183.
- The patch for CVE-2025-7425 also addresses CVE-2025-10911 and CVE-2025-7424.
- The patch for CVE-2025-6021 also addresses CVE-2025-8732.
Oracle JD Edwards Risk Matrix
This Critical Patch Update contains 7 new security patches for Oracle JD Edwards. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-27363
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (FreeType)
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2023-1393
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (X.Org Server)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2025-27210
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (Node.js)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2023-42670
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (Samba)
- Protocol: SMB
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2026-21946
- Product: JD Edwards EnterpriseOne Tools
- Component: Web Runtime SEC
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 9.2.0.0-9.2.26.0
- CVE ID: CVE-2025-26333
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (BSAFE Crypto-J)
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2024-43796
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (Express.js)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.7
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Changed
- Low
- Low
- None
- 9.2.0.0-9.2.9.4
Additional CVEs addressed are:
- The patch for CVE-2023-42670 also addresses CVE-2023-4091, CVE-2023-4154, and CVE-2023-42669.
- The patch for CVE-2025-27210 also addresses CVE-2025-27209.
Oracle MySQL Risk Matrix
This Critical Patch Update contains 20 new security patches for Oracle MySQL. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-6965
- Product: MySQL Server
- Component: Server: Docker Images (SQLite)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 8.4.0-8.4.7
- See Note 1
- CVE ID: CVE-2025-9230
- Product: MySQL Connectors
- Component: Connector/C++ (OpenSSL)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2025-9230
- Product: MySQL Connectors
- Component: Connector/ODBC (OpenSSL)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2025-9086
- Product: MySQL Enterprise Backup
- Component: Enterprise Backup (curl)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0
- CVE ID: CVE-2025-9230
- Product: MySQL Enterprise Backup
- Component: Enterprise Backup (OpenSSL)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2025-9230
- Product: MySQL Server
- Component: Server: Packaging (OpenSSL)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2025-9230
- Product: MySQL Workbench
- Component: MySQL Workbench (OpenSSL)
- Protocol: MySQL Workbench
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.45
- CVE ID: CVE-2025-65018
- Product: MySQL Workbench
- Component: MySQL Workbench (libpng)
- Protocol: MySQL Workbench
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.1
- Supported Versions Affected: Local
- Notes: Low
- None
- Required
- Un-changed
- None
- High
- High
- 8.0.0-8.0.45
- CVE ID: CVE-2026-21949
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21950
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21968
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21929
- Product: MySQL Server
- Component: Server: Parser
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21936
- Product: MySQL Cluster
- Component: Cluster: General
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 7.6.0-7.6.36, 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21936
- Product: MySQL Server
- Component: InnoDB
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21937
- Product: MySQL Server
- Component: Server: DDL
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21941
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21948
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21952
- Product: MySQL Server
- Component: Server: Parser
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21964
- Product: MySQL Server
- Component: Server: Thread Pooling
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21965
- Product: MySQL Server
- Component: Server: Pluggable Auth
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.7
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- Low
- 9.0.0-9.5.0
Notes:
- This vulnerability applies to MySQL server docker images and SQLite isn't directly used by MySQL server.
Additional CVEs addressed are:
- The patch for CVE-2025-9230 also addresses CVE-2025-9232.
- The patch for CVE-2025-9086 also addresses CVE-2025-10148.
- The patch for CVE-2025-65018 also addresses CVE-2025-64505, CVE-2025-64506, and CVE-2025-64720.
Oracle PeopleSoft Risk Matrix
This Critical Patch Update contains 12 new security patches for Oracle PeopleSoft. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-6965
- Product: PeopleSoft Enterprise PeopleTools
- Component: Porting (SQLite)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-9086
- Product: PeopleSoft Enterprise PeopleTools
- Component: File Processing (curl)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-27210
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch Dashboards (Node.js)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-9230
- Product: PeopleSoft Enterprise PeopleTools
- Component: Security (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21961
- Product: PeopleSoft Enterprise HCM Human Resources
- Component: Company Dir / Org Chart Viewer, Employee Snapshot
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 9.2
- CVE ID: CVE-2026-21951
- Product: PeopleSoft Enterprise PeopleTools
- Component: Integration Broker
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21938
- Product: PeopleSoft Enterprise PeopleTools
- Component: Portal
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21934
- Product: PeopleSoft Enterprise PeopleTools
- Component: Push Notifications
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21971
- Product: PeopleSoft Enterprise SCM Purchasing
- Component: Purchasing
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 9.2
- CVE ID: CVE-2025-48924
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-55163
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 8.60, 8.61, 8.62
Additional CVEs addressed are:
- The patch for CVE-2025-9086 also addresses CVE-2025-10148.
- The patch for CVE-2025-66516 also addresses CVE-2025-54988.
- The patch for CVE-2025-27210 also addresses CVE-2025-23084 and CVE-2025-27209.
- The patch for CVE-2025-9230 also addresses CVE-2025-9231 and CVE-2025-9232.
Oracle Retail Applications Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Retail Applications. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-48734
- Product: Oracle Retail Advanced Inventory Planning
- Component: Operations and Maintenance (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 15.0.3, 16.0.3
- CVE ID: CVE-2025-48734
- Product: Oracle Retail Allocation
- Component: Security (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 15.0.3, 16.0.3
- CVE ID: CVE-2025-48734
- Product: Oracle Retail Fiscal Management
- Component: NF Issuing (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 14.2
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Bulk Data Integration
- Component: BDI Job Scheduler (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Financial Integration
- Component: PeopleSoft Integration (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Integration Bus
- Component: RIB Kernal (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Predictive Application Server
- Component: RPAS Client (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 15.0.3, 16.0.3
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Service Backbone
- Component: RSB Installation (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-7962
- Product: Oracle Retail Xstore Office
- Component: Security (Jakarta Mail)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 25.0.1
- CVE ID: CVE-2025-26333
- Product: Oracle Retail Integration Bus
- Component: RIB Kernal (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-26333
- Product: Oracle Retail Predictive Application Server
- Component: RPAS Server (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 15.0.3
- CVE ID: CVE-2025-26333
- Product: Oracle Retail Service Backbone
- Component: RSB Installation (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-48924
- Product: Oracle Retail Fiscal Management
- Component: NF Issuing (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.2
- CVE ID: CVE-2025-61795
- Product: Oracle Retail Xstore Point of Service
- Component: Xenvironment (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0
Oracle Siebel CRM Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Siebel CRM. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-6965
- Product: Siebel CRM Cloud Applications
- Component: Siebel Cloud Manager (OpenSearch Dashboards)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 17.0-25.11
- CVE ID: CVE-2025-53547
- Product: Siebel CRM Cloud Applications
- Component: Siebel Cloud Manager (Helm)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Local
- Notes: Low
- None
- Required
- Changed
- High
- High
- High
- 17.0-25.9
- CVE ID: CVE-2025-48976
- Product: Siebel Apps - Marketing
- Component: Email Marketing (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.9
- CVE ID: CVE-2025-53643
- Product: Siebel CRM Cloud Applications
- Component: Siebel Cloud Manager (AIOHTTP)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 17.0-25.9
- CVE ID: CVE-2025-27817
- Product: Siebel CRM Deployment
- Component: Application Interface (Apache Log4j)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 17.0-25.10
- CVE ID: CVE-2025-48989
- Product: Siebel CRM Deployment
- Component: Application Interface (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.10
- CVE ID: CVE-2021-33813
- Product: Siebel CRM Deployment
- Component: Application Interface (JDOM)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.11
- CVE ID: CVE-2026-21926
- Product: Siebel CRM Deployment
- Component: Server Infrastructure
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.2
- CVE ID: CVE-2024-23807
- Product: Siebel CRM Integration
- Component: EAI (Apache Xerces-C++)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- High
- High
- 17.0-25.9
- CVE ID: CVE-2025-4575
- Product: Siebel CRM Deployment
- Component: Server Infrastructure (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- Low
- 17.0-25.11
- CVE ID: CVE-2022-23395
- Product: Siebel CRM Deployment
- Component: Application Interface (jquery-cookie)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 17.0-25.9
- CVE ID: CVE-2025-8916
- Product: Siebel CRM Deployment
- Component: Server Infrastructure (Bouncy Castle Java Library)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 17.0-25.9
- CVE ID: CVE-2025-48924
- Product: Siebel CRM Integration
- Component: REST (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 17.0-25.9
- CVE ID: CVE-2025-5372
- Product: Siebel CRM Cloud Applications
- Component: Containers and Related Services (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.0
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- Low
- Low
- Low
- 17.0-25.9
Additional CVEs addressed are:
- The patch for CVE-2025-27817 also addresses CVE-2024-31141.
- The patch for CVE-2021-33813 also addresses CVE-2018-1000632 and CVE-2020-10683.
Oracle Supply Chain Risk Matrix
This Critical Patch Update contains 10 new security patches for Oracle Supply Chain. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21969
- Product: Oracle Agile Product Lifecycle Management for Process
- Component: Supplier Portal
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 6.2.4
- CVE ID: CVE-2025-54874
- Product: Oracle AutoVue Office
- Component: Security (OpenJPEG)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 21.1.0
- See Note 1
- CVE ID: CVE-2025-48734
- Product: Oracle Agile PLM
- Component: Security (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 9.3.6
- CVE ID: CVE-2025-48976
- Product: Oracle Agile PLM
- Component: Folders, Files and Attachments (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.3.6
- CVE ID: CVE-2025-48989
- Product: Oracle Agile PLM
- Component: Security (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.3.6
- CVE ID: CVE-2026-21940
- Product: Oracle Agile PLM
- Component: User and User Group
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 9.3.6
- CVE ID: CVE-2025-5115
- Product: Oracle Autovue for Agile Product Lifecycle Management
- Component: Internal Operations (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 21.1.0
- CVE ID: CVE-2025-5115
- Product: Oracle AutoVue Office
- Component: Security (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 21.1.0
- See Note 2
- CVE ID: CVE-2026-21944
- Product: Oracle Agile Product Lifecycle Management for Process
- Component: Product Quality Management
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- None
- None
- 6.2.4
- CVE ID: CVE-2025-31672
- Product: Oracle Agile PLM
- Component: Document Management (Apache POI)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- None
- 9.3.6
Notes:
- This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
- This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
Oracle Systems Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle Systems. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21927
- Product: Oracle Solaris
- Component: Driver
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- High
- High
- None
- 11
- CVE ID: CVE-2026-21935
- Product: Oracle Solaris
- Component: Driver
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- High
- High
- None
- 11
- CVE ID: CVE-2026-21928
- Product: Oracle Solaris
- Component: Kernel
- Protocol: TCP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- None
- None
- 11
- CVE ID: CVE-2026-21942
- Product: Oracle Solaris
- Component: Filesystems
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.0
- Supported Versions Affected: Local
- Notes: Low
- Low
- Required
- Un-changed
- None
- None
- High
- 10, 11
- CVE ID: CVE-2026-21930
- Product: Oracle ZFS Storage Appliance Kit
- Component: Filesystems
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.3
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Un-changed
- None
- Low
- None
- 8.8
Oracle Utilities Applications Risk Matrix
This Critical Patch Update contains 5 new security patches, plus additional third party patches noted below, for Oracle Utilities Applications. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-55163
- Product: Oracle Utilities Network Management System
- Component: Core (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 2.5.0.2.10, 2.6.0.1.9, 2.6.0.2.5
- CVE ID: CVE-2025-48989
- Product: Oracle Utilities Testing Accelerator
- Component: Core (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.0.0.0.6, 7.0.0.1.4, 25.4.0.0.1
- CVE ID: CVE-2026-21924
- Product: Oracle Utilities Application Framework
- Component: General
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- Required
- Changed
- Low
- Low
- None
- 4.4.0.3.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
- CVE ID: CVE-2025-48924
- Product: Oracle Utilities Application Framework
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
- CVE ID: CVE-2025-8916
- Product: Oracle Utilities Application Framework
- Component: Security (Bouncy Castle Java Library)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
Additional CVEs addressed are:
- The patch for CVE-2025-48989 also addresses CVE-2025-52520.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle Utilities Network Management System
- Core (Apache ZooKeeper): CVE-2024-51504 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Virtualization Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21955
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21956
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21987
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21988
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21990
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21989
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- Low
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21957
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Local
- Notes: High
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21983
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Local
- Notes: High
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21984
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Local
- Notes: High
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21982
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: TCP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: AdjacentNetwork
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21986
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.1
- Supported Versions Affected: Local
- Notes: Low
- None
- None
- Changed
- None
- None
- High
- 7.1.14, 7.2.4
- See Note 1
- CVE ID: CVE-2026-21963
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.0
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- None
- None
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21985
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.0
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- None
- None
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21981
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.6
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- Low
- None
- Low
- 7.1.14, 7.2.4
Notes:
- This vulnerability applies to Windows VMs only.
Vulnerabilities included in this bundle
Combined detection rules
Detection rules are retrieved from Rulezet.
Combined sightings
| Author | Vulnerability | Source | Type | Date |
|---|