CVE-2026-21933
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-30
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | graalvm | 21.3.16 |
| oracle | graalvm_for_jdk | 17.0.17 |
| oracle | graalvm_for_jdk | 21.0.9 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 11.0.29 |
| oracle | jdk | 17.0.17 |
| oracle | jdk | 21.0.9 |
| oracle | jdk | 25.0.1 |
| oracle | jre | 1.8.0 |
| oracle | jre | 1.8.0 |
| oracle | jre | 1.8.0 |
| oracle | jre | 11.0.29 |
| oracle | jre | 17.0.17 |
| oracle | jre | 21.0.9 |
| oracle | jre | 25.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition in the Networking component. It allows an unauthenticated attacker with network access to exploit the system via multiple protocols. Successful exploitation requires human interaction from someone other than the attacker. The vulnerability can lead to unauthorized update, insert, or delete access, as well as unauthorized read access to some accessible data. It can be exploited through APIs, such as web services supplying data to these APIs, and also affects Java deployments running sandboxed Java Web Start applications or applets that load untrusted code relying on the Java sandbox for security.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow attackers to gain unauthorized read and write access to data accessible by Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. This means attackers could potentially update, insert, or delete data without permission, leading to data compromise or corruption. The attack requires network access and some user interaction, but no prior privileges are needed by the attacker.