CVE-2025-61882

CRITICAL KEV RANSOMWARE NUCLEI

Oracle E-Business Suite CVE-2025-61882 RCE

Title source: metasploit

Description

Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Exploits (17)

github WORKING POC 54 stars
by watchtowrlabs · pythonremote
https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882
github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Oracle_E_Business-CVE-2025-61882-RCE.py
github WORKING POC 19 stars
by zerozenxlabs · pythonremote
https://github.com/zerozenxlabs/CVE-2025-61882-Oracle-EBS
github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-61882
github WRITEUP 8 stars
by AdityaBhatt3010 · pythonpoc
https://github.com/AdityaBhatt3010/CVE-2025-61882-Oracle-E-Business-Suite-Pre-Auth-RCE-Exploit
github WRITEUP 7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2025/CVE-2025-61882.md
github WORKING POC 7 stars
by Sachinart · pythonremote
https://github.com/Sachinart/CVE-2025-61882
github SCANNER 2 stars
by BattalionX · luapoc
https://github.com/BattalionX/http-oracle-ebs-cve-2025-61882.nse
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-61882
github WORKING POC 1 stars
by GhoStZA-debug · infoleak
https://github.com/GhoStZA-debug/CVE-2025-61882
nomisec WORKING POC 1 stars
by George0Papasotiriou · poc
https://github.com/George0Papasotiriou/CVE-2025-61882-Oracle-BI-Publisher-RCE
nomisec WRITEUP
by sid-203 · poc
https://github.com/sid-203/Enterprise-Information-Security-Risk-Assessment-Oracle-E-Business-Suite-Case-Study
github WORKING POC
by MindflareX · pythonpoc
https://github.com/MindflareX/CVE-2025-61882-POC
nomisec SCANNER
by Zhert-lab · poc
https://github.com/Zhert-lab/CVE-2025-61882-CVE-2025-61884
nomisec SUSPICIOUS
by siddu7575 · poc
https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884
metasploit WORKING POC EXCELLENT
by watchTowr (Sonny, Sina Kheirkhah, Jake Knott), Mathieu Dupas · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb

Nuclei Templates (1)

Oracle E-Business Suite 12.2.3–12.2.14 – Remote Code Execution
CRITICALVERIFIEDby testanull,watchtowr,DhiyaneshDk,pussycat0x
FOFA: title="E-Business Suite"

Scores

CVSS v3 9.8
EPSS 0.8744
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-10-06
VulnCheck KEV 2025-10-04
ENISA EUVD EUVD-2025-32142
Ransomware Use Confirmed

Classification

CWE
CWE-287
Status published

Affected Products (1)

oracle/concurrent_processing < 12.2.14

Timeline

Published Oct 05, 2025
KEV Added Oct 06, 2025
Tracked Since Feb 18, 2026