CISA confirms hackers exploited Oracle E‑Business Suite SSRF flaw

Date of Data Posted: 2025‑10‑21

What You Need to Be Aware Of

  • An unauthenticated Server‑Side Request Forgery (SSRF) vulnerability (CVE‑2025‑61884) in Oracle Configurator is actively being exploited.
  • The flaw can allow attackers to reach internal network resources and exfiltrate or modify critical data.
  • CISA has added this CVE to its Known Exploited Vulnerabilities catalog and mandates patching by federal agencies by Nov 10, 2025.

How It Might Effect You

  • Data Exposure: Attackers can retrieve arbitrary files or invoke internal services, potentially leaking customer or financial data.
  • Privilege Escalation: SSRF may be chained with other weaknesses to gain broader system access, enabling ransomware or sabotage.
  • Compliance Impact: Failure to patch could violate regulations such as PCI‑DSS, HIPAA, or FedRAMP that require protection of sensitive information.

Mitigation Steps

  1. Immediate Actions
    • Apply Oracle’s emergency patch for CVE‑2025‑61884 (October 11 update) which validates the return_url parameter with a strict regex.
    • Verify that the /configurator/UiServlet endpoint no longer accepts arbitrary URLs.
  2. Long‑Term Measures
    • Enable network segmentation so internal services are not reachable from the public face of Oracle Configurator.
    • Deploy Web Application Firewalls or mod_security rules to block SSRF patterns if patching is delayed.
    • Conduct a security assessment of all Oracle E‑Business Suite instances to confirm no other unpatched flaws (e.g., CVE‑2025‑61882) remain.

Sources
CISA confirms hackers exploited Oracle E‑Business Suite SSRF flaw2025‑10‑21
Oracle discloses CVE‑2025‑61884, severity 7.52025‑10‑11