CVE-2025-53052
BaseFortify
Publication date: 2025-10-21
Last updated on: 2025-10-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | workflow | From 12.2.3 (inc) to 12.2.14 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Workflow product of Oracle E-Business Suite, specifically in the Workflow Notification Mailer component. It affects versions 12.2.3 through 12.2.14. An unauthenticated attacker with network access via HTTP can exploit this vulnerability, but successful exploitation requires human interaction from someone other than the attacker. The vulnerability allows unauthorized update, insert, or delete access to some Oracle Workflow accessible data, as well as unauthorized read access to a subset of that data. The scope of the impact may extend beyond Oracle Workflow to additional products.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to gain unauthorized access to Oracle Workflow data, including the ability to read, update, insert, or delete certain data. This could lead to data integrity issues, unauthorized disclosure of information, and potential disruption of business processes that rely on Oracle Workflow. Since the attack requires human interaction, social engineering or phishing could be involved, increasing the risk of compromise.