Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-61882

CVSS 9.8 · Critical KEV · Ransomware EPSS 89.38% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-61882

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Oracle E-Business Suite 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Oracle E-Business Suite是美国甲骨文(Oracle)公司的一套全面集成式的全球业务管理软件。该软件提供了客户关系管理、服务管理、财务管理等功能。 Oracle E-Business Suite 12.2.3版本至12.2.14版本存在安全漏洞,该漏洞源于未经验证的攻击者可通过HTTP网络访问进行攻击,可能导致组件接管。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Oracle CorporationOracle Concurrent Processing 12.2.3 ~ 12.2.14 -

II. Public POCs for CVE-2025-61882

#POC DescriptionSource LinkShenlong Link
1Detection for CVE-2025-61882https://github.com/rxerium/CVE-2025-61882POC Details
2Nonehttps://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882POC Details
3Exploit for CVE-2025-61882 (do not use without any written permission). https://github.com/Sachinart/CVE-2025-61882POC Details
4Oracle Concurrent Processing 12.2.3-12.2.14 contains a remote code execution caused by unauthenticated network access via HTTP, letting unauthenticated attackers fully compromise the system, exploit requires network access via HTTP. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-61882.yamlPOC Details
5CVE-2025-61882https://github.com/B1ack4sh/Blackash-CVE-2025-61882POC Details
6Nonehttps://github.com/zerozenxlabs/CVE-2025-61882-Oracle-EBSPOC Details
7Detection for CVE-2025-61882https://github.com/rxerium/CVE-2025-61882-CVE-2025-61884POC Details
8Nonehttps://github.com/RootAid/CVE-2025-61882POC Details
9POC of CVE-2025-61882 https://github.com/MindflareX/CVE-2025-61882-POCPOC Details
10A critical pre-authentication Remote Code Execution (RCE) flaw in Oracle E-Business Suite (versions 12.2.3 - 12.2.14) allows attackers to gain full control over vulnerable servers via malicious HTTP requests - now actively exploited in the wild.https://github.com/AdityaBhatt3010/CVE-2025-61882-Oracle-E-Business-Suite-Pre-Auth-RCE-ExploitPOC Details
11Detects Oracle E-Business Suite (CVE-2025-61882). Detection: multi-tier checks — fingerprinting, version checks, endpoint & SSRF tests, timing analysis & controlled exploitation 4 high-confidence results. Default = safe fingerprinting only. Set aggressive=true 2 enable active/probing checks use w/caution. Provided By BattalionX BattalionX@proton.mehttps://github.com/BattalionX/http-oracle-ebs-cve-2025-61882.nsePOC Details
12CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit https://github.com/godnish/CVE-2025-61882POC Details
13🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884POC Details
14CVE-2025-61882 — Critical Oracle EBS RCE: Analysis & Responsehttps://github.com/AshrafZaryouh/CVE-2025-61882-Executive-SummaryPOC Details
15CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit https://github.com/GhoStZA-debug/CVE-2025-61882POC Details
16Sorumluluk Reddi Kendi sorumluluğunuzda kullanın, size ait olmayan veya tarama izninizin olmadığı altyapılarda gerçekleştireceğiniz yasa dışı faaliyetlerden sorumlu olmayacağım.https://github.com/Zhert-lab/CVE-2025-61882-CVE-2025-61884POC Details
17CVE-2025-61882https://github.com/Ashwesker/Blackash-CVE-2025-61882POC Details
18Nonehttps://github.com/George0Papasotiriou/CVE-2025-61882-Oracle-BI-Publisher-RCEPOC Details
19Real-world information security risk assessment based on the Oracle E-Business Suite zero-day (CVE-2025-61882). Analyses attacker methods, enterprise risks, and mitigation strategies using ISO 27001, NIST CSF, Cyber Essentials and COBIT.https://github.com/sid-203/Enterprise-Information-Security-Risk-Assessment-Oracle-E-Business-Suite-Case-StudyPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-61882

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-61882

No comments yet


Leave a comment