Description
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Workflow Loader). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Workflow accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
Published: 2026-01-20
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access via Oracle Workflow
Action: Patch immediately
AI Analysis

Impact

A flaw exists in the Workflow Loader component of Oracle E-Business Suite that permits an attacker who has high privileges and can reach the system over HTTP to gain unauthorized access to critical data stored within Oracle Workflow. The vulnerability does not lead to denial of service or remote code execution but can expose all data that the workflow application can access. The weakness is classified as an improper authorization failure, mapping to CWE-284, and is reflected in a CVSS Base score of 4.9, highlighting a high confidentiality impact while integrity and availability remain unaffected.

Affected Systems

Oracle Corporation’s Oracle Workflow product in Oracle E‑Business Suite, specifically versions 12.2.3 through 12.2.15, is affected.

Risk and Exploitability

The CVSS severity indicates a moderate risk level, and the EPSS score of less than 1% suggests that exploitation is currently unlikely but not impossible. The vulnerability is not listed in CISA’s KEV catalog, meaning it has not yet been confirmed in publicly known exploits. The likely attack path requires an attacker with elevated (high) privileges and network access to the HTTP interface of the Workflow Loader. If these conditions are met, the attacker can read any data the workflow application can access.

Generated by OpenCVE AI on April 18, 2026 at 04:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Oracle update that addresses the Workflow Loader high‑privilege vulnerability for affected releases 12.2.3‑12.2.15
  • Restrict network access to the Workflow Loader HTTP endpoint using firewall rules or a reverse‑proxy to limit exposure to trusted hosts
  • If immediate patching is not possible, disable or isolate the vulnerable Workflow Loader component until a corrective update is applied

Generated by OpenCVE AI on April 18, 2026 at 04:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
Title Exploitable Oracle Workflow Vulnerability Enabling Unauthorized Data Access

Wed, 21 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Workflow Loader). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Workflow accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
First Time appeared Oracle
Oracle workflow
CPEs cpe:2.3:a:oracle:workflow:*:*:*:*:*:*:*:*
Vendors & Products Oracle
Oracle workflow
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-01-21T15:55:20.278Z

Reserved: 2026-01-05T18:07:34.713Z

Link: CVE-2026-21959

cve-icon Vulnrichment

Updated: 2026-01-21T15:55:08.944Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T22:15:58.740

Modified: 2026-01-29T20:59:34.357

Link: CVE-2026-21959

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:30:35Z

Weaknesses