First published: Tue Apr 15 2025(Updated: )
Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Configurator accessible data as well as unauthorized read access to a subset of Oracle Configurator accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Configurator | >=12.2.3<=12.2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30720 is an easily exploitable vulnerability that allows unauthenticated attackers to compromise Oracle Configurator.
To fix CVE-2025-30720, upgrade Oracle Configurator to a supported patched version beyond 12.2.14.
CVE-2025-30720 affects users of Oracle Configurator in versions 12.2.3 through 12.2.14.
Yes, CVE-2025-30720 can be exploited remotely via HTTP by unauthenticated attackers.
CVE-2025-30720 affects the Orders component of the Oracle Configurator product.