CVE-2025-61882
CRITICAL KEV RANSOMWARE NUCLEIOracle E-Business Suite CVE-2025-61882 RCE
Title source: metasploitDescription
Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Exploits (17)
github
WORKING POC
54 stars
by watchtowrlabs · pythonremote
https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Oracle_E_Business-CVE-2025-61882-RCE.py
github
WORKING POC
19 stars
by zerozenxlabs · pythonremote
https://github.com/zerozenxlabs/CVE-2025-61882-Oracle-EBS
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-61882
github
WRITEUP
8 stars
by AdityaBhatt3010 · pythonpoc
https://github.com/AdityaBhatt3010/CVE-2025-61882-Oracle-E-Business-Suite-Pre-Auth-RCE-Exploit
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2025/CVE-2025-61882.md
github
SCANNER
2 stars
by BattalionX · luapoc
https://github.com/BattalionX/http-oracle-ebs-cve-2025-61882.nse
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-61882
github
WORKING POC
1 stars
by GhoStZA-debug · infoleak
https://github.com/GhoStZA-debug/CVE-2025-61882
nomisec
WORKING POC
1 stars
by George0Papasotiriou · poc
https://github.com/George0Papasotiriou/CVE-2025-61882-Oracle-BI-Publisher-RCE
nomisec
WRITEUP
by sid-203 · poc
https://github.com/sid-203/Enterprise-Information-Security-Risk-Assessment-Oracle-E-Business-Suite-Case-Study
metasploit
WORKING POC
EXCELLENT
by watchTowr (Sonny, Sina Kheirkhah, Jake Knott), Mathieu Dupas · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Nuclei Templates (1)
Oracle E-Business Suite 12.2.3–12.2.14 – Remote Code Execution
CRITICALVERIFIEDby testanull,watchtowr,DhiyaneshDk,pussycat0x
FOFA:
title="E-Business Suite"
References (4)
Scores
CVSS v3
9.8
EPSS
0.8744
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2025-10-06
VulnCheck KEV
2025-10-04
ENISA EUVD
EUVD-2025-32142
Ransomware Use
Confirmed
Classification
CWE
CWE-287
Status
published
Affected Products (1)
oracle/concurrent_processing
< 12.2.14
Timeline
Published
Oct 05, 2025
KEV Added
Oct 06, 2025
Tracked Since
Feb 18, 2026