Impact
The vulnerability in Oracle WebLogic Server’s Web Services component permits an unauthenticated attacker with network access over HTTP to compromise the server, but it requires a separate human interaction to succeed. If triggered, the attacker can create, delete, or modify critical data stored on the server, thereby violating the integrity of information but not its confidentiality or availability. The flaw is listed as a moderate‑risk issue with a CVSS 6.5 score that highlights potential destructive impact if an automated or manual request can be sent to the server.
Affected Systems
The affected product is Oracle WebLogic Server, specifically versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, and 15.1.1.0.0. These versions are part of Oracle’s Fusion Middleware stack and handle web services traffic.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity, and the absence of an EPSS score means the exploitation likelihood is currently unknown. The vulnerability is not listed in the CISA KEV catalog, suggesting no known public exploits at this time. The attack vector is network‑based (HTTP) and requires user interaction, so a malicious request must be triggered by a person other than the attacker, limiting widespread automated exploitation. Nonetheless, any automated phishing or social‑engineering campaign that encourages a user to hit a specific URL could trigger the flaw.
OpenCVE Enrichment