CVE-2026-34274
Received Received - Intake
Unauthorized Data Modification via UI Vulnerability in Oracle Configurator

Publication date: 2026-04-21

Last updated on: 2026-04-23

Assigner: Oracle

Description
Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Configurator accessible data as well as unauthorized read access to a subset of Oracle Configurator accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oracle configurator From 12.2.3 (inc) to 12.2.15 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Oracle Configurator product of the Oracle E-Business Suite, specifically in the User Interface component. It affects supported versions 12.2.3 through 12.2.15.

An unauthenticated attacker with network access via HTTP can exploit this vulnerability. However, successful exploitation requires human interaction from a person other than the attacker.

The vulnerability allows the attacker to compromise Oracle Configurator, potentially impacting additional products due to scope change.

Successful attacks can result in unauthorized update, insert, or delete access to some Oracle Configurator accessible data, as well as unauthorized read access to a subset of that data.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an unauthenticated attacker to gain unauthorized access to Oracle Configurator data.

  • Unauthorized update, insert, or delete operations on some accessible data.
  • Unauthorized read access to a subset of accessible data.

Because the attack requires human interaction and affects the confidentiality and integrity of data, it can lead to data breaches or data manipulation within Oracle Configurator and potentially other related products.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized read and write access to some data accessible via Oracle Configurator, which could lead to unauthorized disclosure and modification of sensitive information.

Such unauthorized access and data manipulation may impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls over data confidentiality and integrity.

However, the provided information does not explicitly state the specific compliance implications or affected data categories relevant to these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart