Impact
A flaw in Oracle Applications DBA’s ADPatch component permits a high‑privileged network attacker to gain control of the DBA interface over HTTP. The vulnerability is a classic authorization bypass (CWE‑284) that, when exploited, can lead to full takeover of database administration functions, compromising confidentiality, integrity, and availability. Successful attacks also risk affecting other Oracle E‑Business Suite components due to the scope change defined in the advisory.
Affected Systems
The affected product is Oracle Corporation’s Oracle Applications DBA component of Oracle E‑Business Suite. Versions 12.2.3 through 12.2.15 are vulnerable. Any installation of these releases that has not yet received the April 2026 CPU update remains at risk.
Risk and Exploitability
The CVSS v3.1 base score is 7.6, indicating high severity with complete confidentiality, integrity, and availability impact. The attack vector is remote (network) via HTTP (AV:N), requires high privileges (PR:H), and needs human interaction from someone other than the attacker (UI:R). EPSS information is not available, and the flaw is not listed in the CISA KEV catalog, yet the combination of remote access and high‑privilege requirement means that an effective exploit would grant an attacker administrative control and potentially extend to other linked products.
OpenCVE Enrichment