CVE-2020-14882

CRITICAL KEV NUCLEI

Oracle WebLogic Server <14.1.1.0.0 - RCE

Title source: llm

Description

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Exploits (41)

nomisec WORKING POC 4,275 stars
by zhzyker · remote
https://github.com/zhzyker/exphub
nomisec WORKING POC 290 stars
by jas502n · remote
https://github.com/jas502n/CVE-2020-14882
nomisec WORKING POC 147 stars
by GGyao · remote
https://github.com/GGyao/CVE-2020-14882_ALL
nomisec WORKING POC 29 stars
by s1kr10s · remote
https://github.com/s1kr10s/CVE-2020-14882
nomisec WORKING POC 21 stars
by NS-Sp4ce · remote
https://github.com/NS-Sp4ce/CVE-2020-14882
nomisec WORKING POC 17 stars
by XTeam-Wing · remote
https://github.com/XTeam-Wing/CVE-2020-14882
nomisec SCANNER 13 stars
by adm1in · poc
https://github.com/adm1in/CodeTest
nomisec SCANNER 12 stars
by GGyao · remote
https://github.com/GGyao/CVE-2020-14882_POC
nomisec WORKING POC 8 stars
by wsfengfan · remote
https://github.com/wsfengfan/cve-2020-14882
nomisec WORKING POC 8 stars
by ludy-dev · remote
https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE
nomisec WORKING POC 8 stars
by QmF0c3UK · remote
https://github.com/QmF0c3UK/CVE-2020-14882
nomisec WORKING POC 8 stars
by milo2012 · remote
https://github.com/milo2012/CVE-2020-14882
nomisec WRITEUP 7 stars
by corelight · poc
https://github.com/corelight/CVE-2020-14882-weblogicRCE
github SUSPICIOUS 6 stars
by Y5neKO · pythonpoc
https://github.com/Y5neKO/ExpAndPoc_Collection/tree/main/CVE-2020-14882
nomisec WRITEUP 5 stars
by xfiftyone · poc
https://github.com/xfiftyone/CVE-2020-14882
nomisec WORKING POC 3 stars
by mmioimm · remote
https://github.com/mmioimm/cve-2020-14882
nomisec WORKING POC 3 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2020-14882
nomisec WORKING POC 3 stars
by kk98kk0 · remote
https://github.com/kk98kk0/CVE-2020-14882
nomisec WORKING POC 3 stars
by exploitblizzard · remote
https://github.com/exploitblizzard/CVE-2020-14882-WebLogic
nomisec WORKING POC 2 stars
by 0thm4n3 · remote
https://github.com/0thm4n3/cve-2020-14882
nomisec WORKING POC 2 stars
by Ormicron · remote
https://github.com/Ormicron/CVE-2020-14882-GUI-Test
nomisec WORKING POC 2 stars
by Danny-LLi · remote
https://github.com/Danny-LLi/CVE-2020-14882
nomisec WORKING POC 2 stars
by N0Coriander · remote
https://github.com/N0Coriander/CVE-2020-14882-14883
nomisec WORKING POC 1 stars
by b1g-b33f · remote
https://github.com/b1g-b33f/CVE-2020-14882
nomisec WORKING POC 1 stars
by ovProphet · infoleak
https://github.com/ovProphet/CVE-2020-14882-checker
nomisec WORKING POC
by alexfrancow · remote
https://github.com/alexfrancow/CVE-2020-14882
nomisec SCANNER
by pwn3z · remote
https://github.com/pwn3z/CVE-2020-14882-WebLogic
nomisec WORKING POC
by nik0nz7 · remote
https://github.com/nik0nz7/CVE-2020-14882
nomisec WORKING POC
by Root-Shells · remote
https://github.com/Root-Shells/CVE-2020-14882
nomisec WORKING POC
by LucasPDiniz · remote
https://github.com/LucasPDiniz/CVE-2020-14882
nomisec WORKING POC
by xMr110 · remote
https://github.com/xMr110/CVE-2020-14882
nomisec WORKING POC
by zesnd · remote
https://github.com/zesnd/CVE-2020-14882-POC
nomisec WORKING POC
by AleksaZatezalo · remote
https://github.com/AleksaZatezalo/CVE-2020-14882
nomisec NO CODE
by KKC73 · remote
https://github.com/KKC73/weblogic-cve-2020-14882
nomisec WORKING POC
by qianniaoge · poc
https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui
vulncheck_xdb SCANNER
remote
https://github.com/0xn0ne/weblogicScanner
vulncheck_xdb WRITEUP
remote
https://github.com/ihebski/A-Red-Teamer-diaries
exploitdb WORKING POC
by CHackA0101 · pythonwebappsjava
https://www.exploit-db.com/exploits/49479

Nuclei Templates (1)

Oracle Weblogic Server - Remote Command Execution
CRITICALby dwisiswant0
Shodan: http.title:"oracle peoplesoft sign-in" || product:"oracle weblogic"
FOFA: title="oracle peoplesoft sign-in"

Scores

CVSS v3 9.8
EPSS 0.9445
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2020-11-02
InTheWild.io 2021-04-08
ENISA EUVD EUVD-2020-7018

Classification

Status published

Affected Products (5)

oracle/weblogic_server
oracle/weblogic_server
oracle/weblogic_server
oracle/weblogic_server
oracle/weblogic_server

Timeline

Published Oct 21, 2020
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026