CVE-2026-35231
Unauthorized Access via UI Vulnerability in Oracle Financial Services
Publication date: 2026-04-21
Last updated on: 2026-04-27
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | financial_services_transaction_filtering | 8.1.2.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Financial Services Transaction Filtering product, specifically in the User Interface component of version 8.1.2.8.0.
It is an easily exploitable vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise the system.
Successful exploitation can lead to unauthorized access to critical or all accessible data within Oracle Financial Services Transaction Filtering.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily on confidentiality, as it allows unauthorized access to sensitive data.
An attacker exploiting this vulnerability can gain access to critical or all data accessible through Oracle Financial Services Transaction Filtering without any authentication.
This could lead to data breaches, exposure of sensitive financial information, and potential misuse of that data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated attacker with network access to gain unauthorized access to critical data within Oracle Financial Services Transaction Filtering. Such unauthorized access to sensitive or critical data could potentially lead to non-compliance with data protection standards and regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.
However, the provided information does not explicitly detail the impact on compliance with specific standards or regulations.