CVE-2026-34284
Received Received - Intake
Unauthorized Data Modification via Human Workflow in Oracle BPM Suite

Publication date: 2026-04-21

Last updated on: 2026-04-23

Assigner: Oracle

Description
Vulnerability in the Oracle Business Process Management Suite product of Oracle Fusion Middleware (component: Human workflow 11g+). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Process Management Suite. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Process Management Suite, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Process Management Suite accessible data as well as unauthorized read access to a subset of Oracle Business Process Management Suite accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
oracle business_process_management_suite 12.2.1.4.0
oracle business_process_management_suite 14.1.2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Oracle Business Process Management Suite, specifically in the Human workflow 11g+ component. It affects supported versions 12.2.1.4.0 and 14.1.2.0.0. An unauthenticated attacker with network access via HTTP can exploit this vulnerability, but successful exploitation requires human interaction from someone other than the attacker.

The vulnerability allows the attacker to compromise the Oracle Business Process Management Suite, potentially impacting additional products due to scope change. Successful attacks can lead to unauthorized update, insert, or delete access to some accessible data, as well as unauthorized read access to a subset of accessible data.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to gain unauthorized access to data within the Oracle Business Process Management Suite. This includes the ability to read some data without permission and to update, insert, or delete data without authorization.

Such unauthorized access and modification can compromise the integrity and confidentiality of your data, potentially disrupting business processes and leading to data breaches or loss of data trustworthiness.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized read and modification access to data within the Oracle Business Process Management Suite, which could lead to unauthorized disclosure and alteration of sensitive information.

Such unauthorized access and data manipulation may impact compliance with data protection regulations and standards like GDPR and HIPAA, which require strict controls over data confidentiality and integrity.

However, the provided information does not explicitly describe the direct effects on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart