CVE-2026-34292
Remote Code Execution in Oracle WebLogic Server Core
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | weblogic_server | 12.2.1.4.0 |
| oracle | weblogic_server | 14.1.1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability includes a complete compromise of the Oracle WebLogic Server, which affects confidentiality, integrity, and availability of the system.
- Confidentiality impact: sensitive data could be exposed.
- Integrity impact: data and system integrity could be altered or corrupted.
- Availability impact: the server could be disrupted or taken offline.
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle WebLogic Server product, specifically in versions 12.2.1.4.0 and 14.1.1.0.0. It is an easily exploitable flaw that allows a highly privileged attacker with network access via HTTP to compromise the server.
If successfully exploited, the attacker can take over the Oracle WebLogic Server, gaining control over its operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows a high privileged attacker with network access to compromise Oracle WebLogic Server, potentially resulting in a complete takeover of the server.
Such a compromise can lead to unauthorized access, modification, or disruption of sensitive data, which may impact the confidentiality, integrity, and availability of information.
Therefore, exploitation of this vulnerability could lead to non-compliance with standards and regulations like GDPR and HIPAA that require protection of sensitive data and system integrity.