CVE-2026-34284
Unauthorized Data Modification via Human Workflow in Oracle BPM Suite
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | business_process_management_suite | 12.2.1.4.0 |
| oracle | business_process_management_suite | 14.1.2.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Business Process Management Suite, specifically in the Human workflow 11g+ component. It affects supported versions 12.2.1.4.0 and 14.1.2.0.0. An unauthenticated attacker with network access via HTTP can exploit this vulnerability, but successful exploitation requires human interaction from someone other than the attacker.
The vulnerability allows the attacker to compromise the Oracle Business Process Management Suite, potentially impacting additional products due to scope change. Successful attacks can lead to unauthorized update, insert, or delete access to some accessible data, as well as unauthorized read access to a subset of accessible data.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to gain unauthorized access to data within the Oracle Business Process Management Suite. This includes the ability to read some data without permission and to update, insert, or delete data without authorization.
Such unauthorized access and modification can compromise the integrity and confidentiality of your data, potentially disrupting business processes and leading to data breaches or loss of data trustworthiness.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized read and modification access to data within the Oracle Business Process Management Suite, which could lead to unauthorized disclosure and alteration of sensitive information.
Such unauthorized access and data manipulation may impact compliance with data protection regulations and standards like GDPR and HIPAA, which require strict controls over data confidentiality and integrity.
However, the provided information does not explicitly describe the direct effects on compliance with these standards.