CVE-2026-34274
Unauthorized Data Modification via UI Vulnerability in Oracle Configurator
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | configurator | From 12.2.3 (inc) to 12.2.15 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Configurator product of the Oracle E-Business Suite, specifically in the User Interface component. It affects supported versions 12.2.3 through 12.2.15.
An unauthenticated attacker with network access via HTTP can exploit this vulnerability. However, successful exploitation requires human interaction from a person other than the attacker.
The vulnerability allows the attacker to compromise Oracle Configurator, potentially impacting additional products due to scope change.
Successful attacks can result in unauthorized update, insert, or delete access to some Oracle Configurator accessible data, as well as unauthorized read access to a subset of that data.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an unauthenticated attacker to gain unauthorized access to Oracle Configurator data.
- Unauthorized update, insert, or delete operations on some accessible data.
- Unauthorized read access to a subset of accessible data.
Because the attack requires human interaction and affects the confidentiality and integrity of data, it can lead to data breaches or data manipulation within Oracle Configurator and potentially other related products.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized read and write access to some data accessible via Oracle Configurator, which could lead to unauthorized disclosure and modification of sensitive information.
Such unauthorized access and data manipulation may impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls over data confidentiality and integrity.
However, the provided information does not explicitly state the specific compliance implications or affected data categories relevant to these standards.