Oracle Critical Patch Update Advisory - October 2025

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 374 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at October 2025 Critical Patch Update: Executive Summary and Analysis.

Please note that since the release of the July 2025 Critical Patch Update, Oracle has released a Security Alerts for Oracle E-Business Suite CVE-2025-61882 (October 04, 2025) and CVE-2025-61884 (October 11, 2025). Customers are strongly advised to apply the October 2025 Critical Patch Update for Oracle E-Business Suite, which includes patches for these Alerts as well as additional patches.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Enterprise Manager Base Platform, versions 13.5, 24.1 Oracle Enterprise Manager
GoldenGate Stream Analytics, versions 19.1.0.0.0-19.1.0.0.9 Database
Identity Manager, versions 12.2.1.4.0, 14.1.2.1.0 Fusion Middleware
JD Edwards EnterpriseOne Orchestrator, versions 9.2.0.0-9.2.9.4 JD Edwards
JD Edwards EnterpriseOne Tools, versions 9.2.0.0-9.2.9.4 JD Edwards
Management Cloud Engine, version 25.1.0.0.0 Management Cloud Engine
Management Pack for Oracle GoldenGate, version 12.2.1.2.0 Database
MySQL Cluster, versions 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0 MySQL
MySQL Enterprise Backup, versions 8.0.0-8.0.42, 8.4.0-8.4.5, 9.0.0-9.3.0 MySQL
MySQL Server, versions 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0 MySQL
MySQL Shell, versions 8.0.40-8.0.43, 8.4.3-8.4.6, 9.1.0-9.4.0 MySQL
MySQL Workbench, versions 8.0.0-8.0.43 MySQL
Oracle Application Testing Suite, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 Oracle Enterprise Manager
Oracle Banking Branch, versions 14.5.0.0.0-14.8.0.0.0 Contact Support
Oracle Banking Corporate Lending Process Management, versions 14.4.0.0.0-14.7.0.0.0 Contact Support
Oracle Banking Origination, versions 14.5.0.0.0-14.7.0.0.0 Contact Support
Oracle BI Publisher, versions 7.6.0.0.0, 8.2.0.0.0 Oracle Analytics
Oracle Business Intelligence Enterprise Edition, versions 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0 Oracle Analytics
Oracle Coherence, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 Fusion Middleware
Oracle Commerce Guided Search, version 11.4.0 Oracle Commerce
Oracle Commerce Platform, version 11.4.0 Oracle Commerce
Oracle Communications Billing and Revenue Management, versions 12.0.0.4.0-15.0.1.0.0 Oracle Communications Billing and Revenue Management
Oracle Communications Calendar Server, versions 8.0.0.7.0, 8.0.0.8.0 Oracle Communications Calendar Server
Oracle Communications Cloud Native Core Automated Test Suite, versions 24.2.6, 25.1.202 Oracle Communications Cloud Native Core Automated Test Suite
Oracle Communications Cloud Native Core Binding Support Function, versions 24.2.7-25.1.200 Oracle Communications Cloud Native Core Binding Support Function
Oracle Communications Cloud Native Core Certificate Management, version 25.1.200 Oracle Communications Cloud Native Core Certificate Management
Oracle Communications Cloud Native Core Console, versions 24.2.5, 25.1.200 Oracle Communications Cloud Native Core Console
Oracle Communications Cloud Native Core DBTier, version 25.1.200 Oracle Communications Cloud Native Core DBTier
Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 25.1.100, 25.1.200 Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Oracle Communications Cloud Native Core Network Repository Function, versions 24.2.5, 25.1.202 Oracle Communications Cloud Native Core Network Repository Function
Oracle Communications Cloud Native Core Network Slice Selection Function, versions 25.1.100-25.1.200 Oracle Communications Cloud Native Core Network Slice Selection Function
Oracle Communications Cloud Native Core Policy, versions 24.2.7-25.1.200 Oracle Communications Cloud Native Core Policy
Oracle Communications Cloud Native Core Security Edge Protection Proxy, versions 24.2.5, 25.1.200, 25.1.201 Oracle Communications Cloud Native Core Security Edge Protection Proxy
Oracle Communications Cloud Native Core Service Communication Proxy, versions 25.1.200, 25.2.100 Oracle Communications Cloud Native Core Service Communication Proxy
Oracle Communications Cloud Native Core Unified Data Repository, versions 25.1.100, 25.1.200 Oracle Communications Cloud Native Core Unified Data Repository
Oracle Communications Contacts Server, version 8.0.0.9.0 Oracle Communications Contacts Server
Oracle Communications Converged Charging System, versions 2.0.0.0.0-2.0.0.1.0 Oracle Communications Converged Charging System
Oracle Communications Convergence, versions 3.0.3.3.0, 3.0.3.4.0 Oracle Communications Convergence
Oracle Communications Convergent Charging Controller, versions 12.0.1.0.0-12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0 Oracle Communications Convergent Charging Controller
Oracle Communications Diameter Signaling Router, versions 9.0.0.0.0, 9.1.0.0.0 Oracle Communications Diameter Signaling Router
Oracle Communications EAGLE Element Management System, versions 46.6, 47.0 Oracle Communications EAGLE Element Management System
Oracle Communications EAGLE LNP Application Processor, versions 10.2.1.0, 11.0.0.1-11.0.0.2 Oracle Communications EAGLE LNP Application Processor
Oracle Communications LSMS, versions 13.5.1.0, 14.0.0.1, 14.0.0.2 Oracle Communications LSMS
Oracle Communications Messaging Server, version 8.1.0.28 Oracle Communications Messaging Server
Oracle Communications Network Analytics Data Director, versions 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200 Oracle Communications Network Analytics Data Director
Oracle Communications Network Charging and Control, versions 12.0.1.0.0-12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0 Oracle Communications Network Charging and Control
Oracle Communications Network Integrity, versions 7.3.6, 7.4.0, 7.5.0 Oracle Communications Network Integrity
Oracle Communications Offline Mediation Controller, versions 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0 Oracle Communications Offline Mediation Controller
Oracle Communications Operations Monitor, versions 5.1, 5.2, 6.0 Oracle Communications Operations Monitor
Oracle Communications Order and Service Management, versions 7.4.0, 7.4.1, 7.5.0 Oracle Communications Order and Service Management
Oracle Communications Pricing Design Center, versions 12.0.0.4.0-12.0.0.8.0, 15.0.0.0.0-15.0.1.0.0 Oracle Communications Pricing Design Center
Oracle Communications Service Catalog and Design, versions 8.0.0.5.0, 8.1.0.4.0, 8.2.0.1.0 Oracle Communications Service Catalog and Design
Oracle Communications Session Border Controller, versions 4.1.0, 9.0.0, 9.2.0-9.3.0, 10.0.0 Oracle Communications Session Border Controller
Oracle Communications Unified Assurance, versions 6.1.0-6.1.1 Oracle Communications Unified Assurance
Oracle Communications Unified Inventory Management, versions 7.5.0-7.5.1, 7.6.0-7.8.0 Oracle Communications Unified Inventory Management
Oracle Database Server, versions 19.3-19.28, 21.3-21.19, 23.4-23.9 Database
Oracle Documaker, versions 12.7.2.4, 13.0.0.3, 13.0.1.1 Oracle Insurance Applications
Oracle E-Business Suite, versions 12.2.3-12.2.14 Oracle E-Business Suite
Oracle Enterprise Communications Broker, versions 4.1.0-4.2.0, 5.0.0 Oracle Enterprise Communications Broker
Oracle Enterprise Data Quality, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Enterprise Manager for Fusion Middleware, versions 13.5, 24.1 Oracle Enterprise Manager
Oracle Enterprise Operations Monitor, versions 5.1, 5.2, 6.0 Oracle Enterprise Operations Monitor
Oracle Essbase, version 21.7.3.0.0 Database
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.7.9, 8.0.8.7, 8.1.2.5 Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Behavior Detection Platform, versions 8.0.8.1, 8.1.2.9, 8.1.2.10 Oracle Financial Services Behavior Detection Platform
Oracle Financial Services Compliance Studio, version 8.1.2.8 Oracle Financial Services Compliance Studio
Oracle Financial Services Model Management and Governance, versions 8.1.2.7, 8.1.3.2 Oracle Financial Services Model Management and Governance
Oracle Financial Services Revenue Management and Billing, versions 2.9.0.0.0-7.2.0.0.0 Oracle Financial Services Revenue Management and Billing
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition, version 8.0.8 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition
Oracle Fusion Middleware MapViewer, version 12.2.1.4.0 Fusion Middleware
Oracle Global Lifecycle Management NextGen OUI Framework, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 Fusion Middleware
Oracle GoldenGate, versions 19.1.0.0.0-19.28.0.0.250715, 21.3-21.19, 23.4-23.9 Database
Oracle GoldenGate Big Data and Application Adapters, versions 21.3-21.19, 23.4-23.9 Database
Oracle GoldenGate Stream Analytics, versions 19.1.0.0.0-19.1.0.0.12 Database
Oracle GoldenGate Studio, version 12.2.0.4.0 Database
Oracle GoldenGate Veridata, versions 12.2.1.4.0-12.2.1.4.250515, 23.1.0.0.0-23.4.0.0.0 Database
Oracle GraalVM Enterprise Edition, version 21.3.15 Java SE
Oracle GraalVM for JDK, versions 17.0.16, 21.0.8 Java SE
Oracle Graph Server and Client, versions 24.4.1, 24.4.3, 25.1.0, 25.3.0 Database
Oracle Health Sciences Data Management Workbench, versions 3.4.0.1.3, 3.4.1.0.10 Health Sciences
Oracle Healthcare Data Repository, version 8.2.0.5 HealthCare Applications
Oracle Healthcare Master Person Index, versions 5.0.0.0-5.0.9.2 HealthCare Applications
Oracle Hospitality Cruise Shipboard Property Management (SPMS), version 23.2.5 Oracle Hospitality Cruise Shipboard Property Management System
Oracle Hyperion Calculation Manager, version 11.2.22.0.0 Oracle Enterprise Performance Management
Oracle Hyperion Data Relationship Management, version 11.2.22.0.0 Oracle Enterprise Performance Management
Oracle Hyperion Financial Management, version 11.2.22.0.0 Oracle Enterprise Performance Management
Oracle Hyperion Infrastructure Technology, version 11.2.22.0.0 Oracle Enterprise Performance Management
Oracle Hyperion Planning, version 11.2.22.0.0 Oracle Enterprise Performance Management
Oracle Insurance Policy Administration J2EE, versions 11.3.1-12.0.5 Oracle Insurance Applications
Oracle Java SE, versions 8u461, 8u461-b50, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25 Java SE
Oracle JDeveloper, version 12.2.1.4.0 Fusion Middleware
Oracle Life Sciences InForm, version 7.0.1.0 Health Sciences
Oracle Middleware Common Libraries and Tools, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Outside In Technology, versions 8.5.7, 8.5.8 Fusion Middleware
Oracle REST Data Services, version 25.2.1 Database
Oracle Retail Advanced Inventory Planning, versions 15.0.3, 16.0.3 Retail Applications
Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Integration Bus, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Invoice Matching, versions 15.0.3.1, 16.0.3 Retail Applications
Oracle Retail Merchandising System, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Price Management, versions 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Sales Audit, versions 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Service Backbone, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Xstore Office, versions 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0 Retail Applications
Oracle Retail Xstore Point of Service, versions 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0 Retail Applications
Oracle Secure Backup, version 19.1.0.1.0 Database
Oracle Security Service, version 12.2.1.4.0 Fusion Middleware
Oracle SOA Suite, version 14.1.2.0.0 Fusion Middleware
Oracle Solaris, version 11 Systems
Oracle Solaris Cluster, version 4 Systems
Oracle Spatial Studio, versions 24.2.0, 25.1.2 Database
Oracle TimesTen In-Memory Database, versions 18.1.4.1.0-18.1.4.53.0, 22.1.1.1.0-22.1.1.35.0 Database
Oracle Transportation Management, version 6.5.3 Oracle Supply Chain Products
Oracle Utilities Application Framework, versions 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 24.2.0.0.0, 24.3.0.0.0, 25.4, 25.10 Oracle Utilities Applications
Oracle Utilities Network Management System, versions 2.4.0.1.31, 2.5.0.1.15, 2.5.0.2.9, 2.6.0.1.8, 2.6.0.2.3 Oracle Utilities Applications
Oracle VM VirtualBox, versions 7.1.12, 7.2.2 Virtualization
Oracle WebCenter Forms Recognition, version 14.1.1.0.0 Fusion Middleware
Oracle WebCenter Portal, version 12.2.1.4.0 Fusion Middleware
Oracle WebCenter Sites, version 14.1.2.0.0 Fusion Middleware
Oracle WebLogic Server, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 Fusion Middleware
Oracle ZFS Storage Appliance Kit, version 8.8 Systems
PeopleSoft Enterprise CS Financial Aid, version 9.2 PeopleSoft
PeopleSoft Enterprise FIN IT Asset Management, version 9.2 PeopleSoft
PeopleSoft Enterprise FIN Maintenance Management, version 9.2 PeopleSoft
PeopleSoft Enterprise FIN Payables, version 9.2 PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.60, 8.61, 8.62 PeopleSoft
Primavera Gateway, versions 20.12.0-20.12.17, 21.12.0-21.12.15 Oracle Construction and Engineering Suite
Primavera P6 Enterprise Project Portfolio Management, versions 20.12.0.0-20.12.21.0, 21.12.0.0-21.12.21.2, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.14.0, 24.12.0.0-24.12.4.0 Oracle Construction and Engineering Suite
Primavera Unifier, versions 20.12.0-20.12.16, 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.15, 24.12.0-24.12.9 Oracle Construction and Engineering Suite
Retail Predictive Application Server, versions 15.0.3, 16.0.3 Retail Applications
Siebel Applications, versions prior to 25.10 Siebel

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE ID. A vulnerability that affects multiple products will appear with the same CVE ID in all risk matrices.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about conditions required to exploit the vulnerability and the potential impact of a successful exploit. Oracle provides this information so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Vulnerabilities in third party components that are not exploitable through their inclusion in Oracle products are listed below the respective Oracle product's risk matrix. Starting with the July 2023 Critical Patch Update, a VEX justification is also provided.

The protocol in the risk matrix implies that all of its secure variants are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy that further supplements the Lifetime Support Policy as explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • Adam Kues of Assetnote: CVE-2025-61757
  • Andrey Chizhov: CVE-2025-61760, CVE-2025-62592
  • Arjun Basnet: CVE-2025-53063
  • Chan Yiu Tsoi of Maximus Consulting (HK) Ltd: CVE-2025-61763
  • Darius Bohni of 442 Security GmbH: CVE-2025-53066
  • Emad Al-Mousa: CVE-2025-53051, CVE-2025-61749
  • Jinfeng Guo: CVE-2025-53057
  • Kentaro Kawane of GMO Cybersecurity by Ierae: CVE-2025-62587
  • Kush Jijania: CVE-2025-53052, CVE-2025-53056
  • Le Quoc Bao of HPT Vietnam Corporation: CVE-2025-53035
  • Maxime Escourbiac of Michelin CERT: CVE-2025-53072, CVE-2025-62481
  • Nguyen Kim Sang of HPT Vietnam Corporation: CVE-2025-53035
  • Nguyen Tuong Huy of HDBank: CVE-2025-53036, CVE-2025-53037, CVE-2025-61756
  • Pavel Blinnikov: CVE-2025-61760, CVE-2025-62592
  • Prison Break (Gangmin Kim, Sangbin Kim, Hanseo Kim, Sangwon Oh, Sanghoon Lee, Wonjoon Hwang) working with Trend Micro Zero Day Initiative: CVE-2025-61759
  • Shubham Shah of Assetnote: CVE-2025-61757
  • Spike Reply Cyber Security Team: CVE-2025-61751
  • tu3n4nh: CVE-2025-53034
  • VMBreakers (GANGMIN KIM, SANGBIN KIM, Un3xploitable) working with Trend Micro Zero Day Initiative: CVE-2025-62588, CVE-2025-62589, CVE-2025-62590, CVE-2025-62591, CVE-2025-62641
  • Yassine Bengana of Michelin CERT: CVE-2025-53072, CVE-2025-62481
  • yx: CVE-2025-53067, CVE-2025-53069

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:

  • Arjun Basnet
  • Dan Siviter
  • Jaikey Sarraf
  • Nagma Lamabama
  • Nathaniel Oh
  • Simon Camilleri of Yubico
  • Yakov Shafranovich of Amazon Web Services

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.

For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:

  • Aastik Gakhar
  • Abdelrahman Shazly
  • Abdulrahman Albatel
  • Achraf Battou (40rbidd3n)
  • Ahmad Alassaf of Theviperxx Sy
  • Ajay Chebrolu
  • Amish Chandran Kasaragod
  • Asad Ullah Evan
  • Bh33m
  • crnkovic
  • CrowdStrike
  • Gouri Sankar A
  • Hari Priandana
  • Institute for Application Security
  • Jawad Malik
  • Jiya Varghese
  • m0ssser
  • Malicious.Group
  • Mandiant
  • Miguel Segovia Gil [2 reports]
  • Mohamed Afsar J
  • Osman Ahmed
  • Pim Dieleman
  • Saiful Alam Shihab
  • Sanket Shewale
  • Santtu Bergman
  • Securetackles
  • Simon Wijckmans
  • sma
  • Soufiane AMIMI
  • Suraj Yadav
  • Swapnil Gavali
  • Syed Fawad Abbas
  • Tabbu
  • Varad AP Mene
  • Vipin Panchal
  • Zahir Uddin Ahmad
  • Бежан Ааа

Critical Patch Update Schedule

Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 20 January 2026
  • 21 April 2026
  • 21 July 2026
  • 20 October 2026

References

 

Modification History

Date Note
2025-October-21 Rev 1. Initial Release.

 

Oracle Database Products Risk Matrices

This Critical Patch Update contains 18 new security patches for Oracle Database Products divided as follows:

  • 6 new security patches for Oracle Database Products
  • 4 new security patches for Oracle Essbase
  • 6 new security patches for Oracle GoldenGate
  • 1 new security patch for Oracle Graph Server and Client
  • 1 new security patch for Oracle REST Data Services
  • No new security patches for Oracle Secure Backup, but third party patches are provided
  • No new security patches for Oracle Spatial Studio, but third party patches are provided
  • No new security patches for Oracle TimesTen In-Memory Database, but third party patches are provided

 

Oracle Database Server Risk Matrix

This Critical Patch Update contains 6 new security patches, plus additional third party patches noted below, for Oracle Database Products.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE ID Component Package and/or Privilege Required Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-4517 RDBMS (Python) Authenticated User None No 7.3 Local Low Low Required Un-
changed
High High High 21.3-21.19, 23.4-23.9  
CVE-2025-61881 Java VM None Oracle Net Yes 5.9 Network High None None Un-
changed
None High None 19.3-19.28, 21.3-21.19, 23.4-23.9  
CVE-2025-53047 Portable Clusterware None Bonjour Yes 5.8 Network Low None None Changed Low None None 19.3-19.28, 21.3-21.19, 23.4-23.9  
CVE-2025-4949 SQLcl (jgit) Valid account HTTP No 4.8 Network High Low Required Un-
changed
High None None 23.4-23.9  
CVE-2025-53051 RDBMS Functional Index SYSDBA Oracle Net No 2.7 Network Low High None Un-
changed
Low None None 23.4-23.9  
CVE-2025-61749 Unified Audit DBA Oracle Net No 2.7 Network Low High None Un-
changed
None Low None 23.4-23.9  

Additional CVEs addressed are:

  • The patch for CVE-2025-4517 also addresses CVE-2024-12254, CVE-2024-12718, CVE-2024-6923, CVE-2024-8088, CVE-2025-1795, CVE-2025-4138, CVE-2025-4330, and CVE-2025-4435.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Database (Apache Tomcat): CVE-2025-52520, CVE-2025-48989, CVE-2025-52434 and CVE-2025-53506 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Database (Perl): CVE-2025-59375 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
  • GraalVM Multilingual Engine: CVE-2025-50106, CVE-2025-23166, CVE-2025-24855, CVE-2025-27113, CVE-2025-30749, CVE-2025-30752, CVE-2025-30754, CVE-2025-30761, CVE-2025-50059, CVE-2025-50063 and CVE-2025-50065 [VEX Justification: vulnerable_code_not_in_execute_path].
  • RDBMS (Dell BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
  • SQLcl (Apache POI): CVE-2025-31672 [VEX Justification: vulnerable_code_not_in_execute_path].

Oracle Database Server Client-Only Installations

  • The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2025-4949.

 

Oracle Essbase Risk Matrix

This Critical Patch Update contains 4 new security patches, plus additional third party patches noted below, for Oracle Essbase.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-61763 Oracle Essbase Essbase Web Platform HTTP No 8.1 Network Low Low None Un-
changed
High High None 21.7.3.0.0  
CVE-2025-53864 Oracle Essbase Security and Provisioning (Nimbus JOSE+JWT) HTTP Yes 5.8 Network Low None None Changed None None Low 21.7.3.0.0  
CVE-2025-8916 Oracle Essbase Security and Provisioning (Bouncy Castle Java Library) HTTPS Yes 5.3 Network Low None None Un-
changed
None None Low 21.7.3.0.0  
CVE-2020-13956 Oracle Essbase Security and Provisioning (Apache HttpClient) HTTP No 4.3 Network Low Low None Un-
changed
None Low None 21.7.3.0.0  

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Essbase
    • Build (curl): CVE-2025-5399 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
    • Essbase Web Platform (curl): CVE-2025-9086 and CVE-2025-10148 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Security and Provisioning (Apache Commons Lang): CVE-2025-48924 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Security and Provisioning (Enterprise Security API): CVE-2025-5878 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Essbase Web Platform (OpenSSL): CVE-2025-9230 and CVE-2025-9232 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle GoldenGate Risk Matrix

This Critical Patch Update contains 6 new security patches, plus additional third party patches noted below, for Oracle GoldenGate.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2024-52577 Oracle GoldenGate Stream Analytics General (Apache Ignite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 19.1.0.0.0-19.1.0.0.11  
CVE-2025-48976 Oracle GoldenGate Stream Analytics General (Apache Commons FileUpload) HTTP No 6.5 Network Low Low None Un-
changed
None None High 19.1.0.0.0-19.1.0.0.12  
CVE-2025-53864 Oracle GoldenGate Big Data and Application Adapters Java Delivery (Nimbus JOSE+JWT) HTTP Yes 5.8 Network Low None None Changed None None Low 23.4-23.9  
CVE-2024-57699 Oracle GoldenGate Veridata General (json-smart) None No 4.7 Local High Low None Un-
changed
None None High 12.2.1.4.0-12.2.1.4.250515  
CVE-2025-8885 Oracle GoldenGate Big Data and Application Adapters Java Delivery (Bouncy Castle Java FIPS) HTTPS No 4.3 Network Low Low None Un-
changed
None None Low 21.3-21.19, 23.4-23.9  
CVE-2025-8916 Oracle GoldenGate Big Data and Application Adapters Java Delivery (Bouncy Castle Java Library) HTTPS No 4.3 Network Low Low None Un-
changed
None None Low 23.4-23.9  

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • GoldenGate Stream Analytics
    • Security (Bouncy Castle Java Library): CVE-2023-33201 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Management Pack for Oracle GoldenGate
    • Monitor (jackson-databind): CVE-2022-0839 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate
    • OGG Configuration Assistant (JSON-java): CVE-2023-5072 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Big Data and Application Adapters
    • Java Delivery (Netty): CVE-2025-55163 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Java Delivery (Apache Commons Lang): CVE-2025-48924 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Java Delivery (Reactor Netty): CVE-2025-22227 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
  • Oracle GoldenGate Stream Analytics
    • General Issues (Apache ActiveMQ): CVE-2025-27533 [VEX Justification: vulnerable_code_not_in_execute_path].
    • General Issues (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].
    • General Issues (Apache Kafka): CVE-2025-27817 and CVE-2025-27818 [VEX Justification: vulnerable_code_not_in_execute_path].
    • General Issues (Netty): CVE-2025-55163 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Security (Apache ZooKeeper): CVE-2024-51504 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Studio
    • GoldenGate Studio (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].
    • GoldenGate Studio (Spring Framework): CVE-2024-38819 and CVE-2024-38820 [VEX Justification: vulnerable_code_not_in_execute_path].
    • GoldenGate Studio (json-smart): CVE-2024-57699 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Veridata
    • Other issues (Netty): CVE-2025-55163 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Graph Server and Client Risk Matrix

This Critical Patch Update contains 1 new security patch, plus additional third party patches noted below, for Oracle Graph Server and Client.  This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-52520 Graph Server and Client Install (Apache Tomcat) HTTP No 6.5 Network Low Low None Un-
changed
None None High 24.4.3, 25.3.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-52520 also addresses CVE-2025-52434 and CVE-2025-53506.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Graph Server and Client
    • Packaging (Apache Commons VFS): CVE-2025-27553 and CVE-2025-30474 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].

 

Oracle REST Data Services Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle REST Data Services.  This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48976 Oracle REST Data Services Core (Apache Commons FileUpload) HTTP No 4.3 Network Low Low None Un-
changed
None None Low 25.2.1  

 

Oracle Secure Backup Risk Matrix

This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Secure Backup.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Secure Backup.  The English text form of this Risk Matrix can be found here.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Secure Backup
    • Oracle Secure Backup (Apache HTTP Server): CVE-2025-54090 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Oracle Secure Backup (PHP): CVE-2025-1735, CVE-2025-1220 and CVE-2025-6491 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Spatial Studio Risk Matrix

This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Spatial Studio.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Spatial Studio.  The English text form of this Risk Matrix can be found here.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Spatial Studio
    • Install issues (Apache Commons Lang): CVE-2025-48924 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].

 

Oracle TimesTen In-Memory Database Risk Matrix

This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle TimesTen In-Memory Database.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle TimesTen In-Memory Database.  The English text form of this Risk Matrix can be found here.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle TimesTen In-Memory Database
    • EM TimesTen plug-in (7-Zip): CVE-2025-0411 [VEX Justification: vulnerable_code_not_in_execute_path].
    • TimesTen Grid (Apache ZooKeeper): CVE-2024-51504 [VEX Justification: vulnerable_code_not_in_execute_path].
    • TimesTen Grid (Netty): CVE-2025-55163 [VEX Justification: vulnerable_code_not_in_execute_path].
    • TimesTen Install (Perl): CVE-2024-56406 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].

 

Oracle Commerce Risk Matrix

This Critical Patch Update contains 9 new security patches for Oracle Commerce.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48976 Oracle Commerce Platform Dynamo Application Framework (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 11.4.0  
CVE-2025-55163 Oracle Commerce Guided Search Tools And Frameworks (Netty) HTTP/2 No 4.9 Network Low High None Un-
changed
None None High 11.4.0  
CVE-2025-48989 Oracle Commerce Guided Search Tools And Frameworks, Content Acquisition System, Platform Services (Apache Tomcat) HTTP/2 No 4.9 Network Low High None Un-
changed
None None High 11.4.0  
CVE-2024-47554 Oracle Commerce Guided Search Content Acquisition System (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 11.4.0  
CVE-2025-48795 Oracle Commerce Platform Endeca Integration (Apache CXF) HTTP No 4.1 Network High High None Un-
changed
Low Low Low 11.4.0  
CVE-2025-22233 Oracle Commerce Guided Search Tools And Frameworks, Content Acquisition System, Platform Services (Spring Framework) HTTP No 3.1 Network High Low None Un-
changed
None Low None 11.4.0  
CVE-2025-22233 Oracle Commerce Platform Dynamo Application Framework (Spring Framework) HTTP No 3.1 Network High Low None Un-
changed
None Low None 11.4.0  
CVE-2024-57699 Oracle Commerce Guided Search Content Acquisition System (json-smart) HTTP No 2.7 Network Low High None Un-
changed
None None Low 11.4.0  
CVE-2025-48924 Oracle Commerce Guided Search Tools And Frameworks, Content Acquisition System, Platform Services (Apache Commons Lang) HTTP No 2.7 Network Low High None Un-
changed
None None Low 11.4.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-48795 also addresses CVE-2025-23184.
  • The patch for CVE-2025-22233 also addresses CVE-2024-38820.

 

Oracle Communications Applications Risk Matrix

This Critical Patch Update contains 64 new security patches for Oracle Communications Applications.  46 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-6965 Oracle Communications Converged Charging System Installation (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 2.0.0.0.0-2.0.0.1.0  
CVE-2025-6965 Oracle Communications Convergent Charging Controller Data Access Pack (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 12.0.1.0.0-12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0  
CVE-2025-6965 Oracle Communications Messaging Server Security (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 8.1.0.28  
CVE-2025-6965 Oracle Communications Network Charging and Control Data Access Pack (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 12.0.1.0.0-12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0  
CVE-2025-6965 Oracle Communications Unified Assurance Core (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 6.1.0-6.1.1  
CVE-2024-37371 Oracle Communications Converged Charging System Security (Kerberos) HTTP Yes 9.1 Network Low None None Un-
changed
High None High 2.0.0.0.0-2.0.0.1.0  
CVE-2025-49796 Oracle Communications Converged Charging System Security (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 2.0.0.0.0-2.0.0.1.0  
CVE-2025-49796 Oracle Communications Unified Inventory Management Security (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 7.7.0-7.8.0  
CVE-2025-32990 Oracle Communications Unified Inventory Management Security (GnuTLS) HTTPS Yes 8.2 Network Low None None Un-
changed
None Low High 7.7.0-7.8.0  
CVE-2025-27817 Oracle Communications Billing and Revenue Management Platform (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 12.0.0.4.0-15.0.1.0.0  
CVE-2025-55163 Oracle Communications Billing and Revenue Management Security (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 12.0.0.4.0-15.0.1.0.0  
CVE-2025-48976 Oracle Communications Calendar Server Core (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0.8.0  
CVE-2025-48976 Oracle Communications Contacts Server Core (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0.9.0  
CVE-2024-7254 Oracle Communications Converged Charging System Installation (Google Protobuf-Java) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 2.0.0.0.0, 2.0.0.1.0  
CVE-2024-57699 Oracle Communications Converged Charging System Installation (json-smart) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 2.0.0.0.0, 2.0.0.1.0  
CVE-2025-55163 Oracle Communications Converged Charging System Installation (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 2.0.0.0.0, 2.0.0.1.0  
CVE-2025-48976 Oracle Communications Convergence Core (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 3.0.3.4.0  
CVE-2025-27817 Oracle Communications Convergent Charging Controller Notification Gateway (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 12.0.3.0.0-12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0  
CVE-2025-27817 Oracle Communications Network Charging and Control Notification Gateway (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 12.0.3.0.0-12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0, 15.1.0.0.0  
CVE-2025-55163 Oracle Communications Network Charging and Control REST (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 12.0.6.0.0, 15.0.0.0.0-15.0.1.0.0  
CVE-2025-55163 Oracle Communications Offline Mediation Controller Installation (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 15.0.0.0.0-15.0.1.0.0  
CVE-2025-27553 Oracle Communications Order and Service Management Security (Apache Commons VFS) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 7.4.0, 7.4.1, 7.5.0  
CVE-2025-55163 Oracle Communications Order and Service Management Security (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 7.5.0  
CVE-2025-55163 Oracle Communications Pricing Design Center REST Services Manager (Netty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.0.0.4.0-12.0.0.8.0, 15.0.0.0.0-15.0.1.0.0  
CVE-2025-27817 Oracle Communications Service Catalog and Design Solution Designer (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.0.0.5.0, 8.1.0.4.0, 8.2.0.1.0  
CVE-2025-55163 Oracle Communications Service Catalog and Design Solution Designer (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0.5.0, 8.1.0.4.0  
CVE-2025-27817 Oracle Communications Unified Assurance Core (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 6.1.0-6.1.1  
CVE-2025-32415 Oracle Communications Unified Assurance Core (libxml2) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-27553 Oracle Communications Unified Inventory Management Security (Apache Commons VFS) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 7.5.0-7.5.1, 7.6.0-7.8.0  
CVE-2025-5115 Oracle Communications Unified Inventory Management Security (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.5.0-7.5.1, 7.6.0-7.8.0  
CVE-2025-59375 Oracle Communications Unified Inventory Management Security (LibExpat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.7.0-7.8.0  
CVE-2025-9086 Oracle Communications Unified Inventory Management Security (curl) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.7.0-7.8.0  
CVE-2025-55163 Oracle Communications Unified Inventory Management Security (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 7.7.0-7.8.0  
CVE-2025-48734 Oracle Communications Unified Assurance Core (Apache Commons BeanUtils) HTTP No 6.8 Network Low High Required Un-
changed
High High High 6.1.1  
CVE-2025-4517 Oracle Communications Unified Assurance Core (Python) HTTP No 6.7 Network Low High None Un-
changed
High High Low 6.1.0-6.1.1  
CVE-2024-35164 Oracle Communications Unified Assurance Core (Apache Guacamole) HTTP No 6.6 Network High High None Un-
changed
High High High 6.1.0-6.1.1  
CVE-2025-54090 Oracle Communications Unified Assurance Core (Apache HTTP Server) HTTP No 6.3 Network Low Low None Un-
changed
Low Low Low 6.1.0-6.1.1  
CVE-2025-52999 Oracle Communications Unified Assurance Microservices (jackson-core) HTTP No 6.2 Network Low High Required Changed None None High 6.1.0-6.1.1  
CVE-2024-51504 Oracle Communications Unified Assurance Core (Apache ZooKeeper) HTTP No 6.1 Network Low High Required Un-
changed
High None High 6.1.1  
CVE-2025-53864 Oracle Communications Unified Assurance Microservices (Nimbus JOSE+JWT) HTTP Yes 5.8 Network Low None None Changed None None Low 6.1.0-6.1.1  
CVE-2025-53864 Oracle Communications Unified Inventory Management Security (Nimbus JOSE+JWT) HTTP Yes 5.8 Network Low None None Changed None None Low 7.5.1, 7.6.0-7.8.0  
CVE-2025-5318 Oracle Communications Unified Inventory Management Security (libssh) HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 7.7.0, 7.8.0  
CVE-2025-48924 Oracle Communications Calendar Server Administration (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.0.0.7.0  
CVE-2024-12133 Oracle Communications Converged Charging System Installation (Libtasn1) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 2.0.0.0.0-2.0.0.1.0  
CVE-2024-28182 Oracle Communications Converged Charging System Installation (Nghttp2) HTTP/2 Yes 5.3 Network Low None None Un-
changed
None None Low 2.0.0.0.0  
CVE-2025-48924 Oracle Communications Convergence Configuration (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 3.0.3.3.0  
CVE-2025-48924 Oracle Communications Messaging Server Security (Apache Tika) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.1.0.28  
CVE-2025-48924 Oracle Communications Network Integrity Cartridges (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 7.3.6, 7.4.0, 7.5.0  
CVE-2025-48924 Oracle Communications Offline Mediation Controller Install (Swagger UI) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0  
CVE-2025-48924 Oracle Communications Order and Service Management Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 7.4.0, 7.4.1, 7.5.0  
CVE-2025-48924 Oracle Communications Service Catalog and Design Solution Designer (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.0.0.5.0, 8.1.0.4.0, 8.2.0.1.0  
CVE-2025-48924 Oracle Communications Unified Assurance Microservices (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 6.1.0-6.1.1  
CVE-2025-48924 Oracle Communications Unified Inventory Management Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 7.5.0-7.5.1, 7.6.0-7.8.0  
CVE-2025-27533 Oracle Communications Unified Assurance Core (Apache ActiveMQ) HTTP No 4.9 Network Low High None Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-5399 Oracle Communications Unified Assurance Core (MySQL Server) HTTP No 4.5 Network Low High Required Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-27210 Oracle Communications Unified Assurance Core (Node.js) HTTP No 4.5 Network Low High Required Un-
changed
High None None 6.1.0-6.1.1  
CVE-2024-50609 Oracle Communications Unified Assurance Core (fluentbit) HTTP No 4.5 Network Low High Required Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-48989 Oracle Communications Unified Assurance Core (Apache Tomcat) HTTP/2 No 4.5 Network Low High Required Un-
changed
None None High 6.1.0-6.1.1  
CVE-2024-8006 Oracle Communications Unified Assurance Core (libpcap) None No 4.4 Local Low High None Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-8058 Oracle Communications Converged Charging System Installation (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 2.0.0.0.0-2.0.0.1.0  
CVE-2025-8058 Oracle Communications Unified Assurance Core (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 6.1.0-6.1.1  
CVE-2025-8058 Oracle Communications Unified Inventory Management Security Component (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 7.7.0-7.8.0  
CVE-2025-7339 Oracle Communications Unified Assurance Microservices (on-headers) None No 3.4 Local Low High None Un-
changed
Low Low None 6.1.0-6.1.1  
CVE-2025-5889 Oracle Communications Unified Assurance Microservices (brace-expansion) HTTP No 3.1 Network High Low None Un-
changed
None None Low 6.1.0-6.1.1  

Additional CVEs addressed are:

  • The patch for CVE-2025-4517 also addresses CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, and CVE-2025-4435.
  • The patch for CVE-2024-50609 also addresses CVE-2024-50608.
  • The patch for CVE-2025-55163 also addresses CVE-2025-24970 and CVE-2025-25193.
  • The patch for CVE-2025-27553 also addresses CVE-2025-30474.
  • The patch for CVE-2025-9086 also addresses CVE-2025-10148.
  • The patch for CVE-2024-37371 also addresses CVE-2024-26462 and CVE-2024-37370.
  • The patch for CVE-2024-8006 also addresses CVE-2023-7256.
  • The patch for CVE-2025-5318 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, CVE-2025-5449, and CVE-2025-5987.
  • The patch for CVE-2025-32990 also addresses CVE-2025-32988, CVE-2025-32989, and CVE-2025-6395.
  • The patch for CVE-2025-27210 also addresses CVE-2025-23084 and CVE-2025-27209.
  • The patch for CVE-2025-27817 also addresses CVE-2025-27818.
  • The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.

 

Oracle Communications Risk Matrix

This Critical Patch Update contains 73 new security patches, plus additional third party patches noted below, for Oracle Communications.  47 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-6965 Oracle Communications Cloud Native Core Certificate Management Configuration (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 25.1.200  
CVE-2025-6965 Oracle Communications Cloud Native Core Policy Alarms, KPI, and Measurements (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 24.2.7-25.1.200  
CVE-2025-6965 Oracle Communications Cloud Native Core Unified Data Repository Automated Test Suite Framework (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 25.1.200  
CVE-2025-6965 Oracle Communications Network Analytics Data Director Core (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200  
CVE-2025-4517 Oracle Communications Cloud Native Core Binding Support Function Install (Python) HTTP Yes 9.4 Network Low None None Un-
changed
High High Low 24.2.7-25.1.200  
CVE-2025-4517 Oracle Communications Cloud Native Core DBTier Configuration (Python) HTTP Yes 9.4 Network Low None None Un-
changed
High High Low 25.1.200  
CVE-2025-4517 Oracle Communications Cloud Native Core Network Slice Selection Function Install (Python) HTTP Yes 9.4 Network Low None None Un-
changed
High High Low 25.1.200  
CVE-2025-4517 Oracle Communications Cloud Native Core Policy Alarms, KPI, and Measurements (Python) Multiple Yes 9.4 Network Low None None Un-
changed
High High Low 24.2.7-25.1.200  
CVE-2025-4517 Oracle Communications Diameter Signaling Router ATS Framework (Python) HTTP Yes 9.4 Network Low None None Un-
changed
High High Low 9.1.0.0.0  
CVE-2025-4517 Oracle Communications Network Analytics Data Director ATS Framework (Python) HTTP Yes 9.4 Network Low None None Un-
changed
High High Low 24.2.0, 24.2.1, 24.3.0, 25.1.100, 25.1.200  
CVE-2025-49796 Oracle Communications Cloud Native Core Binding Support Function Install (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 24.2.7-25.1.200  
CVE-2025-49796 Oracle Communications Cloud Native Core Console Install (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 24.2.5, 25.1.200  
CVE-2025-49796 Oracle Communications Cloud Native Core DBTier Configuration (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 25.1.200  
CVE-2025-49796 Oracle Communications Cloud Native Core Network Repository Function Signaling (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 24.2.5, 25.1.202  
CVE-2025-49796 Oracle Communications Cloud Native Core Network Slice Selection Function Install (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 25.1.100-25.1.200  
CVE-2025-49796 Oracle Communications Cloud Native Core Policy Alarms, KPI, and Measurements (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 24.2.7-25.1.200  
CVE-2025-49796 Oracle Communications Cloud Native Core Security Edge Protection Proxy Install (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 25.1.201  
CVE-2025-49796 Oracle Communications Cloud Native Core Unified Data Repository Signaling (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 25.1.200  
CVE-2025-48734 Oracle Communications Cloud Native Core Binding Support Function Install (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 24.2.7-25.1.200  
CVE-2025-48734 Oracle Communications Cloud Native Core Console Configuration (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 25.1.200  
CVE-2025-57803 Oracle Communications Operations Monitor Developer Infrastructure (ImageMagick) HTTP No 8.8 Network Low Low None Un-
changed
High High High 5.1, 5.2, 6.0  
CVE-2025-53547 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (Helm) None No 8.6 Local Low None Required Changed High High High 25.1.100, 25.1.200  
CVE-2025-4802 Oracle Communications Cloud Native Core Binding Support Function Install (FreeType) None No 7.8 Local Low None Required Un-
changed
High High High 24.2.7-25.1.200  
CVE-2025-7425 Oracle Communications Cloud Native Core Certificate Management Configuration (libxml2) None No 7.8 Local High None None Changed None High High 25.1.200  
CVE-2025-4802 Oracle Communications Cloud Native Core Policy Policy (glibc) None No 7.8 Local Low None Required Un-
changed
High High High 24.2.7-25.1.200  
CVE-2025-25724 Oracle Communications Network Analytics Data Director Core (libarchive) None No 7.8 Local Low Low None Un-
changed
High High High 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200  
CVE-2025-48989 Management Cloud Engine BEServer (Apache Tomcat) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 25.1.0.0.0  
CVE-2025-5115 Oracle Communications Cloud Native Core Binding Support Function Alarms, KPI, and Measurements (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-5115 Oracle Communications Cloud Native Core Binding Support Function Install (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-55163 Oracle Communications Cloud Native Core Binding Support Function Install (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-7962 Oracle Communications Cloud Native Core Console Configuration (Jakarta Mail) HTTP Yes 7.5 Network Low None None Un-
changed
None High None 24.2.5, 25.1.200  
CVE-2025-5115 Oracle Communications Cloud Native Core Network Repository Function Signaling (Jenkins) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.5, 25.1.202  
CVE-2025-55163 Oracle Communications Cloud Native Core Network Slice Selection Function Install (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 25.1.200  
CVE-2025-5115 Oracle Communications Cloud Native Core Policy Alarms, KPI, and Measurements (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-5115 Oracle Communications Cloud Native Core Policy Configuration (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-58057 Oracle Communications Cloud Native Core Policy Configuration (Netty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-55163 Oracle Communications Cloud Native Core Policy Alarms, KPI, and Measurements (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 24.2.7-25.1.200  
CVE-2025-48976 Oracle Communications Cloud Native Core Security Edge Protection Proxy Automated Test Suite (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.5, 25.1.201  
CVE-2025-48976 Oracle Communications Cloud Native Core Service Communication Proxy Automated Test Suite Framework (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 25.1.200, 25.2.100  
CVE-2025-48976 Oracle Communications Cloud Native Core Unified Data Repository Automated Test Suite Framework (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 25.1.200  
CVE-2025-55163 Oracle Communications Cloud Native Core Unified Data Repository Signaling (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 25.1.200  
CVE-2025-48976 Oracle Communications EAGLE Element Management System Security (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 47.0  
CVE-2025-27553 Oracle Communications EAGLE Element Management System Security (Apache Commons VFS) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 47.0  
CVE-2025-1948 Oracle Communications EAGLE Element Management System Security (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 47.0  
CVE-2025-48976 Oracle Communications Network Analytics Data Director Automated Test Suite (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200  
CVE-2025-53643 Oracle Communications Operations Monitor Developer Infrastructure (AIOHTTP) HTTP Yes 7.5 Network Low None None Un-
changed
None High None 5.2, 6.0  
CVE-2023-26555 Oracle Communications Session Border Controller Routing (NTP) None No 6.4 Physical High None None Un-
changed
High High High 9.0.0  
CVE-2025-54090 Oracle Communications Cloud Native Core Automated Test Suite ATS Framework (Apache HTTP Server) HTTP No 6.3 Network Low Low None Un-
changed
Low Low Low 24.2.6, 25.1.202  
CVE-2025-54090 Oracle Communications Cloud Native Core Security Edge Protection Proxy Automated Test Suite (Apache HTTP Server) HTTP No 6.3 Network Low Low None Un-
changed
Low Low Low 25.1.200  
CVE-2025-54090 Oracle Communications Cloud Native Core Service Communication Proxy ATS Framework (Apache HTTP Server) HTTP No 6.3 Network Low Low None Un-
changed
Low Low Low 25.1.200, 25.2.100  
CVE-2025-54090 Oracle Communications Cloud Native Core Unified Data Repository Automated Test Suite Framework (Apache HTTP Server) HTTP No 6.3 Network Low Low None Un-
changed
Low Low Low 25.1.200  
CVE-2025-3576 Oracle Communications Network Analytics Data Director Core (Kerberos) SSH Yes 5.9 Network High None None Un-
changed
None High None 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200  
CVE-2025-8916 Oracle Communications Cloud Native Core Certificate Management Configuration (Bouncy Castle Java Library) HTTPS Yes 5.3 Network Low None None Un-
changed
None None Low 25.1.200  
CVE-2025-27587 Oracle Communications Cloud Native Core Certificate Management Configuration (OpenSSL) HTTPS No 5.3 Network High Low None Un-
changed
High None None 25.1.200  
CVE-2025-48924 Oracle Communications Cloud Native Core Network Repository Function Signaling (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 24.2.5, 25.1.202  
CVE-2024-12133 Oracle Communications Cloud Native Core Unified Data Repository Signaling (Libtasn1) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 25.1.100  
CVE-2025-48924 Oracle Communications Diameter Signaling Router Automated Test Suite (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 9.0.0.0.0  
CVE-2024-12133 Oracle Communications EAGLE LNP Application Processor Patches (Libtasn1) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 10.2.1.0, 11.0.0.1-11.0.0.2  
CVE-2024-12133 Oracle Communications LSMS Platform (Libtasn1) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 13.5.1.0, 14.0.0.1, 14.0.0.2  
CVE-2025-4373 Oracle Communications Cloud Native Core Certificate Management Configuration (glibc) HTTP Yes 4.8 Network High None None Un-
changed
None Low Low 25.1.200  
CVE-2024-47554 Oracle Communications EAGLE Element Management System Security (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 46.6, 47.0  
CVE-2025-8058 Oracle Communications Cloud Native Core Binding Support Function Install (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 24.2.7-25.1.200  
CVE-2025-8058 Oracle Communications Cloud Native Core Network Slice Selection Function Install (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 25.1.200  
CVE-2025-8058 Oracle Communications Cloud Native Core Policy Alarms, KPI, and Measurements (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 24.2.7-25.1.200  
CVE-2025-8058 Oracle Communications Cloud Native Core Security Edge Protection Proxy Install (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 25.1.201  
CVE-2025-8058 Oracle Communications Cloud Native Core Service Communication Proxy Signaling (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 25.1.200, 25.2.100  
CVE-2025-8058 Oracle Communications Diameter Signaling Router ATS Framework (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 9.1.0.0.0  
CVE-2025-8058 Oracle Communications Session Border Controller Routing (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 9.3.0, 10.0.0  
CVE-2025-8058 Oracle Enterprise Communications Broker Routing (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 4.1.0, 4.2.0  
CVE-2025-8058 Oracle Enterprise Operations Monitor Infrastructure (glibc) None No 4.2 Local High Low Required Un-
changed
Low Low Low 5.1, 5.2, 6.0  
CVE-2025-32728 Oracle Communications Session Border Controller Sysadmin (OpenSSH) None No 3.8 Local Low Low None Changed None Low None 4.1.0, 9.0.0, 9.2.0-9.3.0, 10.0.0  
CVE-2025-32728 Oracle Enterprise Communications Broker Routing (OpenSSH) None No 3.8 Local Low Low None Changed None Low None 4.1.0-4.2.0, 5.0.0  
CVE-2025-5889 Oracle Communications Network Analytics Data Director Platform (brace-expansion) RMI No 3.1 Network High Low None Un-
changed
None None Low 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200  

Additional CVEs addressed are:

  • The patch for CVE-2025-4517 also addresses CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, and CVE-2025-4435.
  • The patch for CVE-2025-5115 also addresses CVE-2025-59474, CVE-2025-59475, and CVE-2025-59476.
  • The patch for CVE-2025-27553 also addresses CVE-2025-30474.
  • The patch for CVE-2025-48989 also addresses CVE-2025-52520.
  • The patch for CVE-2025-57803 also addresses CVE-2025-55212 and CVE-2025-55298.
  • The patch for CVE-2025-4373 also addresses CVE-2024-52533.
  • The patch for CVE-2023-26555 also addresses CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, and CVE-2023-26554.
  • The patch for CVE-2025-27587 also addresses CVE-2025-4575.
  • The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
  • The patch for CVE-2025-7425 also addresses CVE-2025-49794, CVE-2025-49796, and CVE-2025-6021.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Communications Cloud Native Core Network Function Cloud Native Environment
    • Configuration (Node.js): CVE-2025-27210, CVE-2025-23084 and CVE-2025-27209 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle Communications Cloud Native Core Policy
    • Alarms, KPI, and Measurements (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Construction and Engineering Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Construction and Engineering.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-27363 Primavera P6 Enterprise Project Portfolio Management Outside In Technology Installer in P6 (FreeType) HTTP Yes 8.1 Network High None None Un-
changed
High High High 20.12.0.0-20.12.21.0, 21.12.0.0-21.12.21.2, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.14.0, 24.12.0.0-24.12.4.0  
CVE-2025-27363 Primavera Unifier Document Management (FreeType) HTTP Yes 8.1 Network High None None Un-
changed
High High High 20.12.0-20.12.16, 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.15, 24.12.0-24.12.9  
CVE-2025-27553 Primavera Gateway Admin (Apache Commons VFS) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 20.12.0-20.12.17, 21.12.0-21.12.15  
CVE-2025-48976 Primavera Unifier Document Management (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 20.12.0-20.12.16, 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.15, 24.12.0-24.12.9  
CVE-2025-5878 Primavera Unifier Platform (Enterprise Security API for Java (Legacy)) HTTPS Yes 7.3 Network Low None None Un-
changed
Low Low Low 20.12.0-20.12.16, 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.15, 24.12.0-24.12.9  
CVE-2025-48924 Primavera Gateway Admin (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 20.12.0-20.12.17, 21.12.0-21.12.15  
CVE-2025-48924 Primavera Unifier Platform (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 20.12.0-20.12.16, 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.15, 24.12.0-24.12.9  

Additional CVEs addressed are:

  • The patch for CVE-2025-27553 also addresses CVE-2025-30474.

 

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 9 new security patches for Oracle E-Business Suite.  6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2025 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (October 2025), My Oracle Support Note 2484000.1.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-53072 Oracle Marketing Marketing Administration HTTP Yes 9.8 Network Low None None Un-
changed
High High High 12.2.3-12.2.14  
CVE-2025-62481 Oracle Marketing Marketing Administration HTTP Yes 9.8 Network Low None None Un-
changed
High High High 12.2.3-12.2.14  
CVE-2025-53043 Oracle Product Hub Item Catalog HTTP No 8.1 Network Low Low None Un-
changed
High High None 12.2.3-12.2.14  
CVE-2025-53058 Oracle Applications Manager Application Logging Interfaces HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.3-12.2.14  
CVE-2025-53041 Oracle iStore Shopping Cart HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.5-12.2.14  
CVE-2025-61753 Oracle Scripting Miscellaneous HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.3-12.2.14  
CVE-2025-53052 Oracle Workflow Workflow Notification Mailer HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.3-12.2.14  
CVE-2025-53064 Oracle Applications Framework Personalization HTTP No 4.3 Network Low Low None Un-
changed
None Low None 12.2.3-12.2.14  
CVE-2025-53071 Oracle Applications Framework Upload Attachments HTTP No 4.3 Network Low Low None Un-
changed
None Low None 12.2.3-12.2.14  

 

Oracle Enterprise Manager Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Enterprise Manager.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2025 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2025 Patch Availability Document for Oracle Products, My Oracle Support Note 3102566.1.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48976 Oracle Application Testing Suite Load Testing for Web Apps (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0  
CVE-2024-38819 Oracle Enterprise Manager for Fusion Middleware Infrastructure Management (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 13.5, 24.1  
CVE-2025-49128 Enterprise Manager Base Platform Security Framework (jackson-databind) None No 4.0 Local Low None None Un-
changed
Low None None 13.5, 24.1  

Additional CVEs addressed are:

  • The patch for CVE-2024-38819 also addresses CVE-2024-38820.

 

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 33 new security patches for Oracle Financial Services Applications.  29 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-53037 Oracle Financial Services Analytical Applications Infrastructure Platform HTTP Yes 9.8 Network Low None None Un-
changed
High High High 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-6965 Oracle Financial Services Compliance Studio Reports (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 8.1.2.8  
CVE-2025-53036 Oracle Financial Services Analytical Applications Infrastructure Platform HTTP Yes 8.6 Network Low None None Changed High None None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2020-11988 Oracle Financial Services Analytical Applications Infrastructure Platform (Apache XmlGraphics Commons) HTTP Yes 8.2 Network Low None None Un-
changed
High Low None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-61751 Oracle Financial Services Analytical Applications Infrastructure Platform HTTP No 8.1 Network Low Low None Un-
changed
High High None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-48976 Oracle Banking Branch Reports (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.0.0-14.8.0.0.0  
CVE-2025-27817 Oracle Banking Branch Reports (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 14.5.0.0.0-14.8.0.0.0  
CVE-2025-55163 Oracle Banking Branch Reports (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.0.0-14.8.0.0.0  
CVE-2025-32415 Oracle Banking Corporate Lending Process Management Platform (libxml2) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.4.0.0.0-14.7.0.0.0  
CVE-2025-32415 Oracle Banking Origination Maintenance (libxml2) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.0.0-14.7.0.0.0  
CVE-2025-48976 Oracle Financial Services Analytical Applications Infrastructure Platform (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-27553 Oracle Financial Services Analytical Applications Infrastructure Platform (Apache Commons VFS) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.0.7.9, 8.0.8.7  
CVE-2024-28168 Oracle Financial Services Analytical Applications Infrastructure Platform (Apache FOP) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-41249 Oracle Financial Services Analytical Applications Infrastructure Platform (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-61756 Oracle Financial Services Analytical Applications Infrastructure System Configuration HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-41249 Oracle Financial Services Behavior Detection Platform Platform (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.0.8.1, 8.1.2.9, 8.1.2.10  
CVE-2025-59375 Oracle Financial Services Behavior Detection Platform Third Party (LibExpat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.8.1, 8.1.2.9, 8.1.2.10  
CVE-2025-5115 Oracle Financial Services Compliance Studio Reports (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.1.2.8  
CVE-2025-48976 Oracle Financial Services Model Management and Governance Installer (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.1.2.7, 8.1.3.2  
CVE-2025-48989 Oracle Financial Services Model Management and Governance Installer (Apache Tomcat) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 8.1.2.7, 8.1.3.2  
CVE-2025-48976 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition Platform (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.8  
CVE-2025-59375 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition Platform (LibExpat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.8  
CVE-2025-41249 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition Platform (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.0.8  
CVE-2025-53035 Oracle Financial Services Analytical Applications Infrastructure Platform HTTP No 6.5 Network Low Low None Un-
changed
High None None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-50075 Oracle Financial Services Revenue Management and Billing Security Management System HTTP No 6.5 Network Low Low None Un-
changed
High None None 2.9.0.0.0-7.2.0.0.0  
CVE-2025-53034 Oracle Financial Services Analytical Applications Infrastructure Platform HTTP Yes 5.4 Network Low None Required Un-
changed
Low Low None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-48924 Oracle Financial Services Analytical Applications Infrastructure Platform (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-31672 Oracle Financial Services Analytical Applications Infrastructure Platform (Apache POI) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 8.0.7.9, 8.0.8.7, 8.1.2.5  
CVE-2025-48924 Oracle Financial Services Behavior Detection Platform Third Party (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.0.8.1, 8.1.2.9, 8.1.2.10  
CVE-2025-48924 Oracle Financial Services Compliance Studio Reports (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.1.2.8  
CVE-2025-48924 Oracle Financial Services Model Management and Governance Installer (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.1.2.7, 8.1.3.2  
CVE-2025-48924 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition Platform (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.0.8  
CVE-2025-50074 Oracle Financial Services Revenue Management and Billing Security Management System HTTP No 4.9 Network Low High None Un-
changed
High None None 2.9.0.0.0-7.2.0.0.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-27553 also addresses CVE-2025-30474.
  • The patch for CVE-2025-32415 also addresses CVE-2025-32414.
  • The patch for CVE-2025-27817 also addresses CVE-2025-27818.

 

Oracle Fusion Middleware Risk Matrix

This Critical Patch Update contains 20 new security patches, plus additional third party patches noted below, for Oracle Fusion Middleware.  17 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

To get the full list of current and previously released Critical Patch Update patches for Oracle Fusion Middleware products, refer to My Oracle Support Doc ID 2806740.2.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-61757 Identity Manager REST WebServices HTTP Yes 9.8 Network Low None None Un-
changed
High High High 12.2.1.4.0, 14.1.2.1.0  
CVE-2023-45853 Oracle Outside In Technology Outside In Search Export SDK (zlib) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 8.5.7, 8.5.8  
CVE-2025-48734 Oracle JDeveloper ADF, ADF Faces (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 12.2.1.4.0  
CVE-2025-55163 Oracle Coherence Third Party (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0  
CVE-2025-27533 Oracle Enterprise Data Quality General (Apache ActiveMQ) TLS Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-48976 Oracle Fusion Middleware MapViewer Install (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0  
CVE-2025-8916 Oracle Global Lifecycle Management NextGen OUI Framework Centralized Thirdparty Jars (Bouncy Castle Java Library) HTTPS Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0  
CVE-2025-48976 Oracle Middleware Common Libraries and Tools Thirdparty Patch (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2024-48014 Oracle Security Service C Oracle SSL API (Dell BSAFE Micro Edition Suite) TLS Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0  
CVE-2025-27817 Oracle SOA Suite Adapters (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 14.1.2.0.0  
CVE-2025-61752 Oracle WebLogic Server Core HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 14.1.1.0.0, 14.1.2.0.0  
CVE-2025-53816 Oracle Outside In Technology Core (7-Zip) HTTP No 6.5 Network Low Low None Un-
changed
None None High 8.5.7, 8.5.8  
CVE-2024-41909 Oracle Middleware Common Libraries and Tools Third Party (Apache Mina SSHD) SSH Yes 5.9 Network High None None Un-
changed
None High None 12.2.1.4.0  
CVE-2025-48795 Oracle WebCenter Forms Recognition ALE Learnset Manager (Apache CXF) HTTP Yes 5.6 Network High None None Un-
changed
Low Low Low 14.1.1.0.0  
CVE-2020-15250 Oracle WebLogic Server Centralized Thirdparty Jars (GlassFish Server) None No 5.5 Local Low None Required Un-
changed
High None None 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0  
CVE-2025-48924 Oracle Enterprise Data Quality General (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-48924 Oracle WebCenter Forms Recognition ALE Learnset Manager (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.1.0.0  
CVE-2025-48924 Oracle WebCenter Portal Portal, Analytics and REST (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0  
CVE-2025-48924 Oracle WebLogic Server Centralized Thirdparty Jars (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0  
CVE-2025-61764 Oracle WebLogic Server Core HTTP Yes 5.3 Network Low None None Un-
changed
Low None None 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-27817 also addresses CVE-2025-27818.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle WebCenter Sites
    • WebCenter Sites (Spring Security): CVE-2025-22235, CVE-2023-34055, CVE-2024-38819, CVE-2024-38821, CVE-2024-38827, CVE-2024-38828 and CVE-2025-22228 [VEX Justification: vulnerable_code_not_in_execute_path].
    • WebCenter Sites (json-smart): CVE-2023-1370 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Analytics Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle Analytics.  5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-53049 Oracle Business Intelligence Enterprise Edition Analytics Web Administration HTTP No 8.4 Network Low High Required Changed High High High 7.6.0.0.0, 8.2.0.0.0  
CVE-2024-7254 Oracle Business Intelligence Enterprise Edition Analytics Server (Google Protobuf-Java) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.6.0.0.0  
CVE-2025-48976 Oracle Business Intelligence Enterprise Edition Platform Security (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0  
CVE-2025-61754 Oracle BI Publisher Web Service API HTTP No 6.5 Network Low Low None Un-
changed
High None None 7.6.0.0.0, 8.2.0.0.0  
CVE-2024-12797 Oracle Business Intelligence Enterprise Edition Analytics Server (Cryptography) HTTP Yes 6.3 Network Low None Required Un-
changed
Low Low Low 7.6.0.0.0, 8.2.0.0.0  
CVE-2025-48795 Oracle BI Publisher Web Service API (Apache CXF) HTTP Yes 5.6 Network High None None Un-
changed
Low Low Low 7.6.0.0.0, 8.2.0.0.0  
CVE-2025-25193 Oracle Business Intelligence Enterprise Edition Analytics Server (Netty) None No 5.5 Local Low Low None Un-
changed
None None High 7.6.0.0.0  
CVE-2024-47554 Oracle Business Intelligence Enterprise Edition Analytics Server (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0  

 

Oracle Health Sciences Applications Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Health Sciences Applications.  1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-62287 Oracle Life Sciences InForm Web Server HTTP Yes 6.1 Network Low None Required Changed Low Low None 7.0.1.0  
CVE-2025-62288 Oracle Health Sciences Data Management Workbench Logger HTTP No 4.9 Network Low High None Un-
changed
High None None 3.4.0.1.3, 3.4.1.0.10  
CVE-2025-61885 Oracle Life Sciences InForm Web Server HTTP No 4.3 Network Low Low None Un-
changed
Low None None 7.0.1.0  

 

Oracle HealthCare Applications Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle HealthCare Applications.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2024-38819 Oracle Healthcare Data Repository FHIR Server (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.2.0.5  
CVE-2025-48924 Oracle Healthcare Data Repository FHIR Server (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.2.0.5  
CVE-2025-48924 Oracle Healthcare Master Person Index Master Index Data Manager (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 5.0.0.0-5.0.9.2  

Additional CVEs addressed are:

  • The patch for CVE-2024-38819 also addresses CVE-2024-38820.

 

Oracle Hospitality Applications Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle Hospitality Applications.  3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Hospitality Cruise Shipboard Property Management (SPMS) Next-Gen SPMS (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 23.2.5  
CVE-2025-48989 Oracle Hospitality Cruise Shipboard Property Management (SPMS) Next-Gen SPMS (Apache Tomcat) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 23.2.5  
CVE-2025-55163 Oracle Hospitality Cruise Shipboard Property Management (SPMS) Next-Gen SPMS (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 23.2.5  
CVE-2024-12798 Oracle Hospitality Cruise Shipboard Property Management (SPMS) Next-Gen SPMS (logback) None No 6.1 Local Low Low Required Un-
changed
Low High Low 23.2.5  
CVE-2025-48924 Oracle Hospitality Cruise Shipboard Property Management (SPMS) Next-Gen SPMS (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 23.2.5  

 

Oracle Hyperion Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Hyperion.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Hyperion Calculation Manager Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 11.2.22.0.000  
CVE-2025-48734 Oracle Hyperion Infrastructure Technology Installation and Configuration (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 11.2.22.0.000  
CVE-2025-48734 Oracle Hyperion Planning Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 11.2.22.0.000  
CVE-2024-23807 Oracle Hyperion Financial Management Security (Apache Xerces-C++) HTTP Yes 8.1 Network High None None Un-
changed
High High High 11.2.22.0.000 See Note 1
CVE-2025-48976 Oracle Hyperion Calculation Manager Security (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 11.2.22.0.000  
CVE-2021-3712 Oracle Hyperion Financial Management Installation (OpenSSL) HTTP Yes 7.4 Network High None None Un-
changed
High None High 11.2.22.0.000  
CVE-2025-3573 Oracle Hyperion Data Relationship Management Web Client - Unicode (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 11.2.22.0.000  

Notes:

  1. Apply to Linux release only.
 

Additional CVEs addressed are:

  • The patch for CVE-2021-3712 also addresses CVE-2021-3711.

 

Oracle Insurance Applications Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle Insurance Applications.  5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Documaker EWPS (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 12.7.2.4, 13.0.0.3, 13.0.1.1  
CVE-2025-48734 Oracle Insurance Policy Administration J2EE Third Party (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 11.3.1-12.0.5  
CVE-2025-27363 Oracle Documaker Documaker Core (FreeType) HTTP Yes 8.1 Network High None None Un-
changed
High High High 13.0.0.3, 13.0.1.1  
CVE-2025-48976 Oracle Documaker Docupresentment (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.7.2.4, 13.0.0.3, 13.0.1.1  
CVE-2025-48976 Oracle Insurance Policy Administration J2EE Architecture (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 11.3.1-12.0.5  
CVE-2023-2976 Oracle Documaker EWPS (Google Guava) None No 7.1 Local Low Low None Un-
changed
High High None 12.7.2.4, 13.0.0.3, 13.0.1.1  
CVE-2022-24329 Oracle Documaker EWPS (JetBrains Kotlin) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 12.7.2.4, 13.0.0.3, 13.0.1.1  
CVE-2024-47554 Oracle Documaker EWPS (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 12.7.2.4, 13.0.0.3, 13.0.1.1  

 

Oracle Java SE Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle Java SE.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Low" instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.

Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-31257 Oracle Java SE JavaFX (WebKitGTK) Multiple Yes 7.5 Network High None Required Un-
changed
High High High Oracle Java SE: 8u461-b50 See Note 1
CVE-2025-53066 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition JAXP Multiple Yes 7.5 Network Low None None Un-
changed
High None None Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16, 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15 See Note 2
CVE-2025-53057 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition Security Multiple Yes 5.9 Network High None None Un-
changed
None High None Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16, 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15 See Note 2
CVE-2025-61755 Oracle GraalVM for JDK Compiler Multiple Yes 3.7 Network High None None Un-
changed
Low None None Oracle GraalVM for JDK: 17.0.16, 21.0.8  
CVE-2025-61748 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 3.7 Network High None None Un-
changed
None Low None Oracle Java SE: 21.0.8, 25; Oracle GraalVM for JDK: 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15 See Note 2

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
 

Additional CVEs addressed are:

  • The patch for CVE-2025-31257 also addresses CVE-2025-24189, CVE-2025-31273, CVE-2025-31278, CVE-2025-43211, CVE-2025-43212, CVE-2025-43216, CVE-2025-43227, CVE-2025-43228, CVE-2025-43240, CVE-2025-43265, and CVE-2025-6558.

 

Oracle JD Edwards Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle JD Edwards.  6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2024-52046 JD Edwards EnterpriseOne Tools Business Logic Infra SEC (Apache Mina) SFTP Yes 9.8 Network Low None None Un-
changed
High High High 9.2.0.0-9.2.9.4  
CVE-2025-48734 JD Edwards EnterpriseOne Tools Portal Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 9.2.0.0-9.2.9.4  
CVE-2024-13009 JD Edwards EnterpriseOne Orchestrator E1 IOT Orchestrator Security (Eclipse Jetty) HTTP Yes 7.2 Network Low None None Changed Low Low None 9.2.0.0-9.2.9.4  
CVE-2025-53056 JD Edwards EnterpriseOne Tools Object and Environment Tech HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2.0.0-9.2.9.4  
CVE-2025-53060 JD Edwards EnterpriseOne Tools Web Runtime SEC HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2.0.0-9.2.9.4  
CVE-2021-22897 JD Edwards EnterpriseOne Tools Enterprise Infrastructure SEC (curl) HTTP Yes 5.3 Network Low None None Un-
changed
Low None None 9.2.0.0-9.2.9.4  
CVE-2025-31672 JD Edwards EnterpriseOne Tools Web Runtime SEC (Apache POI) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 9.2.0.0-9.2.9.4  
CVE-2024-9143 JD Edwards EnterpriseOne Tools Enterprise Infrastructure SEC (OpenSSL) JDENET No 4.3 Network Low Low None Un-
changed
None Low None 9.2.0.0-9.2.9.4  

 

Oracle MySQL Risk Matrix

This Critical Patch Update contains 18 new security patches, plus additional third party patches noted below, for Oracle MySQL.  7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

MySQL Router provides the docker images based on Oracle Linux which has the regular security advisories. MySQL Router packages with docker images should be updated regularly to inherit the patches from Oracle Linux.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-6965 MySQL Workbench MySQL Workbench (SQLite) MySQL Workbench Yes 9.8 Network Low None None Un-
changed
High High High 8.0.0-8.0.43  
CVE-2025-4517 MySQL Workbench MySQL Workbench (Python) MySQL Workbench Yes 9.4 Network Low None None Un-
changed
High High Low 8.0.0-8.0.43  
CVE-2025-49796 MySQL Cluster Cluster: General (libxml2) Multiple Yes 9.1 Network Low None None Un-
changed
None High High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-49796 MySQL Workbench MySQL Workbench (libxml2) MySQL Workbench Yes 9.1 Network Low None None Un-
changed
None High High 8.0.0-8.0.43  
CVE-2025-5399 MySQL Cluster Cluster: General (curl) Multiple Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-5399 MySQL Enterprise Backup Enterprise Backup (curl) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0-8.0.42, 8.4.0-8.4.5, 9.0.0-9.3.0  
CVE-2024-35195 MySQL Cluster Cluster: General (Requests) Multiple No 5.6 Local High High Required Un-
changed
High High None 8.0.0-8.0.40, 8.4.0-8.4.3, 9.0.0-9.1.0  
CVE-2025-53054 MySQL Server InnoDB MySQL Protocol No 5.5 Network Low High None Un-
changed
None Low High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53053 MySQL Server Server: DML MySQL Protocol No 5.5 Network Low High None Un-
changed
None Low High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-5318 MySQL Workbench MySQL Workbench (libssh) MySQL Workbench No 5.4 Network Low Low None Un-
changed
Low Low None 8.0.0-8.0.43  
CVE-2024-12133 MySQL Cluster Cluster: General (Libtasn1) Multiple Yes 5.3 Network Low None None Un-
changed
None None Low 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53044 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53045 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53062 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53069 MySQL Server Server: Components Services MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53040 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53042 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-53067 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 9.0.0-9.4.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-4517 also addresses CVE-2024-12718, CVE-2025-4138, CVE-2025-4330, and CVE-2025-4435.
  • The patch for CVE-2025-5318 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, CVE-2025-5449, and CVE-2025-5987.
  • The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • MySQL Shell
    • Shell: Core Client (Python setuptools): CVE-2025-47273 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle PeopleSoft Risk Matrix

This Critical Patch Update contains 18 new security patches for Oracle PeopleSoft.  7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-4517 PeopleSoft Enterprise PeopleTools Porting (Python) HTTP Yes 9.4 Network Low None None Un-
changed
High High Low 8.60, 8.61, 8.62  
CVE-2025-48734 PeopleSoft Enterprise PeopleTools Portal (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 8.60, 8.61, 8.62  
CVE-2025-53050 PeopleSoft Enterprise PeopleTools Performance Monitor HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.60, 8.61, 8.62  
CVE-2025-61758 PeopleSoft Enterprise FIN IT Asset Management IT Asset Management HTTP No 6.5 Network Low Low None Un-
changed
High None None 9.2  
CVE-2025-4575 PeopleSoft Enterprise PeopleTools Security, Porting, Cloud Deployment Architecture (OpenSSL) HTTPS Yes 6.5 Network Low None None Un-
changed
None Low Low 8.60, 8.61, 8.62  
CVE-2024-54160 PeopleSoft Enterprise PeopleTools OpenSearch Dashboards (OpenSearch Dashboards) HTTP No 6.4 Network Low Low None Changed Low Low None 8.62  
CVE-2025-61762 PeopleSoft Enterprise FIN Payables Payables HTTP No 6.3 Network Low Low None Un-
changed
Low Low Low 9.2  
CVE-2025-53055 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.60, 8.61, 8.62  
CVE-2025-53061 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP No 5.5 Network Low High None Changed Low Low None 8.60, 8.61, 8.62  
CVE-2025-61761 PeopleSoft Enterprise FIN Maintenance Management Work Order Management HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 9.2  
CVE-2025-53063 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP No 5.4 Network Low Low Required Changed Low Low None 8.60, 8.61, 8.62  
CVE-2025-53065 PeopleSoft Enterprise PeopleTools PIA Core Technology HTTP Yes 5.4 Network Low None Required Un-
changed
Low Low None 8.60, 8.61, 8.62  
CVE-2025-53048 PeopleSoft Enterprise PeopleTools Rich Text Editor HTTP No 5.4 Network Low Low Required Changed Low Low None 8.60, 8.61, 8.62  
CVE-2025-48924 PeopleSoft Enterprise CS Financial Aid FM Need Analysis Calculator (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 9.2  
CVE-2025-50181 PeopleSoft Enterprise PeopleTools Porting (urllib3) HTTP No 5.3 Network High Low None Un-
changed
High None None 8.60, 8.61, 8.62  
CVE-2025-31672 PeopleSoft Enterprise PeopleTools nVision (Apache POI) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 8.60, 8.61, 8.62  
CVE-2025-53059 PeopleSoft Enterprise PeopleTools OpenSearch Dashboards HTTP No 4.9 Network Low High None Un-
changed
High None None 8.60, 8.61, 8.62  
CVE-2025-61750 PeopleSoft Enterprise PeopleTools Query HTTP No 4.3 Network Low Low None Un-
changed
Low None None 8.61, 8.62  

Additional CVEs addressed are:

  • The patch for CVE-2025-50181 also addresses CVE-2025-50182.
  • The patch for CVE-2025-4517 also addresses CVE-2024-12718, CVE-2024-9287, CVE-2025-4138, CVE-2025-4330, and CVE-2025-4435.

 

Oracle Retail Applications Risk Matrix

This Critical Patch Update contains 18 new security patches for Oracle Retail Applications.  14 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Retail Invoice Matching Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 15.0.3.1, 16.0.3  
CVE-2025-48734 Oracle Retail Price Management Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 15.0.3.1, 16.0.3  
CVE-2025-48734 Retail Predictive Application Server Fusion Client (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 15.0.3, 16.0.3  
CVE-2025-48976 Oracle Retail Merchandising System Foundation (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 16.0.3, 19.0.1  
CVE-2023-34053 Oracle Retail Merchandising System Foundation (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 16.0.3, 19.0.1  
CVE-2025-48989 Oracle Retail Xstore Office Security (Apache Tomcat) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0  
CVE-2025-48976 Oracle Retail Xstore Point of Service Xenvironment (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1  
CVE-2025-48989 Oracle Retail Xstore Point of Service Xenvironment (Apache Tomcat) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 24.0.1  
CVE-2025-55163 Oracle Retail Xstore Point of Service Xenvironment (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 22.0.2, 23.0.2, 24.0.1  
CVE-2023-44483 Oracle Retail Advanced Inventory Planning Internal Operations (Apache Santuario XML Security For Java) Multiple No 6.5 Network Low Low None Un-
changed
High None None 15.0.3, 16.0.3  
CVE-2025-48924 Oracle Retail Financial Integration PeopleSoft Integration Bugs (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1  
CVE-2025-48924 Oracle Retail Integration Bus RIB Kernal (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1  
CVE-2025-48924 Oracle Retail Merchandising System Foundation (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 16.0.3, 19.0.1  
CVE-2025-48924 Oracle Retail Sales Audit Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 15.0.3.1, 16.0.3, 19.0.1  
CVE-2025-48924 Oracle Retail Service Backbone RSB Installation (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1  
CVE-2025-48924 Oracle Retail Xstore Point of Service Xenvironment (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0  
CVE-2024-47554 Oracle Retail Merchandising System Foundation (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 16.0.3, 19.0.1  
CVE-2024-47554 Oracle Retail Price Management Security (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 15.0.3.1, 16.0.3, 19.0.1  

Additional CVEs addressed are:

  • The patch for CVE-2025-48989 also addresses CVE-2025-48988, CVE-2025-49124, CVE-2025-49125, CVE-2025-52434, CVE-2025-52520, and CVE-2025-53506.

 

Oracle Siebel CRM Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle Siebel CRM.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-31651 Siebel CRM Deployment Application Interface (Apache Tomcat) HTTP Yes 9.8 Network Low None None Un-
changed
High High High Prior to 25.8  
CVE-2024-4140 Siebel CRM Deployment Keyword Automation (Email-MIME) HTTP Yes 7.5 Network Low None None Un-
changed
None None High Prior to 25.7  
CVE-2021-28165 Siebel CRM End User Desktop Integration Siebel Agent (Apache ZooKeeper) HTTP Yes 7.5 Network Low None None Un-
changed
None None High Prior to 25.7  
CVE-2025-48988 Siebel CRM End User User Interface (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High Prior to 25.10  
CVE-2020-13956 Siebel CRM Development Siebel Approval Manager (Apache HttpClient) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None Prior to 25.7  
CVE-2024-47554 Siebel Apps - Marketing Marketing (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low Prior to 25.7  
CVE-2024-47554 Siebel Apps - Marketing Web Marketing (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low Prior to 25.7  
CVE-2024-47554 Siebel CRM Deployment Keyword Automation (Spring Framework) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low Prior to 25.8  

Additional CVEs addressed are:

  • The patch for CVE-2024-47554 also addresses CVE-2022-22968, CVE-2022-25647, and CVE-2024-38820.
  • The patch for CVE-2025-31651 also addresses CVE-2025-31650.
  • The patch for CVE-2025-48988 also addresses CVE-2025-49124 and CVE-2025-49125.

 

Oracle Supply Chain Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Supply Chain.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48976 Oracle Transportation Management Install (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 6.5.3  

 

Oracle Systems Risk Matrix

This Critical Patch Update contains 16 new security patches for Oracle Systems.  3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Solaris Cluster Core (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 4  
CVE-2024-38819 Oracle Solaris Cluster Core (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 4  
CVE-2024-57699 Oracle Solaris Cluster Core (json-smart) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 4  
CVE-2025-62290 Oracle ZFS Storage Appliance Kit Block Storage HTTP No 7.2 Network Low High None Un-
changed
High High High 8.8  
CVE-2025-53068 Oracle Solaris Kernel None No 6.5 Local Low Low None Changed None None High 11  
CVE-2025-53070 Oracle Solaris Filesystem None No 5.5 Local Low High Required Changed None None High 11  
CVE-2020-17521 Oracle Solaris Cluster Core (Apache Groovy) None No 5.5 Local Low Low None Un-
changed
High None None 4  
CVE-2025-53046 Oracle ZFS Storage Appliance Kit Analytics HTTP No 4.9 Network Low High None Un-
changed
None None High 8.8  
CVE-2025-62475 Oracle ZFS Storage Appliance Kit Core HTTP No 4.9 Network Low High None Un-
changed
None None High 8.8  
CVE-2025-62289 Oracle ZFS Storage Appliance Kit Filesystems HTTP No 4.9 Network Low High None Un-
changed
None None High 8.8  
CVE-2025-62478 Oracle ZFS Storage Appliance Kit Object Store HTTP No 4.9 Network Low High None Un-
changed
None None High 8.8  
CVE-2025-62476 Oracle ZFS Storage Appliance Kit Remote Replication HTTP No 4.9 Network Low High None Un-
changed
None None High 8.8  
CVE-2025-62477 Oracle ZFS Storage Appliance Kit Remote Replication HTTP No 4.9 Network Low High None Un-
changed
None None High 8.8  
CVE-2024-47554 Oracle Solaris Cluster Core (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 4  
CVE-2025-62479 Oracle ZFS Storage Appliance Kit Block Storage HTTP No 2.7 Network Low High None Un-
changed
None None Low 8.8  
CVE-2025-62480 Oracle ZFS Storage Appliance Kit Naming Subsystem HTTP No 2.7 Network Low High None Un-
changed
None None Low 8.8  

Additional CVEs addressed are:

  • The patch for CVE-2024-38819 also addresses CVE-2024-38820.

 

Oracle Utilities Applications Risk Matrix

This Critical Patch Update contains 3 new security patches, plus additional third party patches noted below, for Oracle Utilities Applications.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Utilities Application Framework Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 24.2.0.0.0, 24.3.0.0.0, 25.4, 25.10  
CVE-2025-48976 Oracle Utilities Application Framework Security (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 24.2.0.0.0, 24.3.0.0.0, 25.4, 25.10  
CVE-2025-53864 Oracle Utilities Application Framework Security (Nimbus JOSE+JWT) HTTP Yes 5.8 Network Low None None Changed None None Low 4.3.0.5.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 24.2.0.0.0, 24.3.0.0.0, 25.4, 25.10  

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Utilities Network Management System
    • Core (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Virtualization Risk Matrix

This Critical Patch Update contains 9 new security patches for Oracle Virtualization.  None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-62587 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.12, 7.2.2  
CVE-2025-62588 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.12, 7.2.2  
CVE-2025-62589 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.12, 7.2.2  
CVE-2025-62641 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.12, 7.2.2  
CVE-2025-62590 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.12, 7.2.2  
CVE-2025-61760 Oracle VM VirtualBox Core None No 7.5 Local High Low Required Changed High High High 7.1.12, 7.2.2  
CVE-2025-61759 Oracle VM VirtualBox Core None No 6.5 Local Low Low None Changed High None None 7.1.12, 7.2.2  
CVE-2025-62591 Oracle VM VirtualBox Core None No 6.0 Local Low High None Changed High None None 7.1.12, 7.2.2  
CVE-2025-62592 Oracle VM VirtualBox Core None No 6.0 Local Low High None Changed High None None 7.1.12, 7.2.2