Impact
The vulnerability in Oracle WebLogic Server’s Web Services component permits an unauthenticated attacker with network access over HTTP to compromise the server, but it requires a separate human interaction to succeed. If triggered, the attacker can create, delete, or modify critical data stored on the server, thereby violating the integrity of information but not its confidentiality or availability. The flaw is listed as a moderate‑risk issue with a CVSS 6.5 score that highlights potential destructive impact if an automated or manual request can be sent to the server.
Affected Systems
The affected product is Oracle WebLogic Server, specifically versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, and 15.1.1.0.0. These versions are part of Oracle’s Fusion Middleware stack and handle web services traffic.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. The EPSS score of < 1% indicates an extremely low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, meaning no known public exploits. The attack vector is network‑based (HTTP) and requires user interaction, so a malicious request must be triggered by a person other than the attacker, limiting widespread automated exploitation. Nonetheless, any automated phishing or social‑engineering campaign that encourages a user to hit a specific URL could trigger the flaw.
OpenCVE Enrichment