CVE-2026-21925
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-30
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | graalvm | 21.3.16 |
| oracle | graalvm_for_jdk | 17.0.17 |
| oracle | graalvm_for_jdk | 21.0.9 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 11.0.29 |
| oracle | jdk | 17.0.17 |
| oracle | jdk | 21.0.9 |
| oracle | jdk | 25.0.1 |
| oracle | jre | 1.8.0 |
| oracle | jre | 1.8.0 |
| oracle | jre | 1.8.0 |
| oracle | jre | 11.0.29 |
| oracle | jre | 17.0.17 |
| oracle | jre | 21.0.9 |
| oracle | jre | 25.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition, specifically in the RMI component. It allows an unauthenticated attacker with network access to exploit APIs, such as those used by web services, to gain unauthorized read and write access to some accessible data. It can also affect Java deployments running sandboxed Java Web Start applications or applets that load untrusted code relying on the Java sandbox for security. The vulnerability is difficult to exploit and impacts confidentiality and integrity.
How can this vulnerability impact me? :
If successfully exploited, this vulnerability can allow an attacker to perform unauthorized updates, inserts, or deletions on some accessible data within Oracle Java SE and related products, as well as unauthorized reading of some data. This could lead to data compromise or manipulation without proper authorization.