CVE-2025-30756
BaseFortify
Publication date: 2025-07-15
Last updated on: 2025-07-25
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | rest_data_services | 24.2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Oracle REST Data Services version 24.2.0 and allows an unauthenticated attacker with network access via HTTP to compromise the service. The attacker needs a user other than themselves to interact (human interaction required). Successful exploitation can lead to unauthorized reading, updating, inserting, or deleting of some data accessible through Oracle REST Data Services. The vulnerability affects confidentiality and integrity but not availability.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow unauthorized parties to read sensitive data or modify data within Oracle REST Data Services. This could lead to data breaches, data corruption, or unauthorized data manipulation, potentially affecting the integrity and confidentiality of your data and systems that rely on this service.