CVE-2026-34297
Unauthorized Access Vulnerability in Oracle HCM Knowledge Integration
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | hcm_common_architecture | From 12.2.3 (inc) to 12.2.15 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to gain unauthorized access to critical or all accessible data within Oracle HCM Common Architecture. Such unauthorized access to sensitive data could potentially lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict controls to protect personal and health information.
However, the provided information does not explicitly mention the impact on compliance with specific standards or regulations.
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle HCM Common Architecture product of Oracle E-Business Suite, specifically in the Knowledge Integration component. It affects supported versions 12.2.3 through 12.2.15. The flaw is easily exploitable by an unauthenticated attacker who has network access via HTTP.
An attacker can exploit this vulnerability without any privileges or user interaction, potentially compromising the Oracle HCM Common Architecture system.
How can this vulnerability impact me? :
Successful exploitation of this vulnerability can lead to unauthorized access to critical data or even complete access to all data accessible through Oracle HCM Common Architecture.
The impact is primarily on confidentiality, as indicated by the CVSS score, meaning sensitive information could be exposed to attackers.