CVE-2025-50061

5.4 MEDIUM

📋 TL;DR

This vulnerability in Oracle Primavera P6 Enterprise Project Portfolio Management allows authenticated attackers with low privileges to perform unauthorized data manipulation and limited data reading through web interface interaction. It affects multiple supported versions from 20.12.0 through 24.12.4. Successful exploitation requires human interaction from someone other than the attacker.

💻 Affected Systems

Products:
  • Oracle Primavera P6 Enterprise Project Portfolio Management
Versions: 20.12.0-20.12.21, 21.12.0-21.12.21, 22.12.0-22.12.19, 23.12.0-23.12.13, 24.12.0-24.12.4
Operating Systems: All supported platforms running Primavera P6
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Web Access component. Requires network access via HTTP and low privileged user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical project data, insert malicious content, or delete important project information, potentially disrupting project management operations and causing business impact.

🟠

Likely Case

Low-privileged users could elevate their access to modify or view data they shouldn't have access to, potentially leading to data integrity issues or unauthorized information disclosure.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minor data manipulation within the attacker's authorized scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access and user interaction, but is described as 'easily exploitable' by Oracle.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update July 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2025.html

Restart Required: Yes

Instructions:

1. Download appropriate patches from Oracle Support. 2. Apply patches according to Oracle documentation. 3. Restart Primavera P6 services. 4. Verify patch application.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit HTTP access to Primavera P6 Web Access to trusted networks only

Configure firewall rules to restrict access to Primavera P6 ports (typically 80/443)

Implement Least Privilege

all

Review and minimize user privileges to reduce attack surface

Review user roles in Primavera P6 administration console and remove unnecessary permissions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Primavera P6 from untrusted networks
  • Enhance monitoring of user activity and data modification logs for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check Primavera P6 version via administration console or version files. Compare against affected version ranges.

Check Version:

Check Primavera P6 version in administration console under Help > About or examine version.properties files in installation directory.

Verify Fix Applied:

Verify patch application through Oracle patch verification tools or by confirming version is outside affected ranges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data modification patterns by low-privileged users
  • Multiple failed authentication attempts followed by successful login and data access

Network Indicators:

  • HTTP requests to Primavera P6 Web Access with unusual parameter patterns
  • Traffic from unexpected source IPs to Primavera P6

SIEM Query:

source="primavera_p6" AND (event_type="data_modification" AND user_privilege="low") OR (authentication.success AND previous_failures > 3)

🔗 References

📤 Share & Export