CVE-2025-61754

6.5 MEDIUM

📋 TL;DR

This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to access sensitive data via the Web Service API. It affects Oracle Analytics versions 7.6.0.0.0 and 8.2.0.0.0, potentially exposing confidential business intelligence data to unauthorized users.

💻 Affected Systems

Products:
  • Oracle BI Publisher
  • Oracle Analytics
Versions: 7.6.0.0.0 and 8.2.0.0.0
Operating Systems: All supported platforms for Oracle BI Publisher
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Web Service API component specifically. Requires low privileged account access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all Oracle BI Publisher accessible data, including sensitive business intelligence reports, financial data, and confidential organizational information.

🟠

Likely Case

Unauthorized access to specific critical data sets or reports that the attacker can discover through the vulnerable API endpoints.

🟢

If Mitigated

Limited data exposure if proper network segmentation and access controls are implemented, restricting which data low-privileged users can access.

🌐 Internet-Facing: HIGH - The vulnerability requires only HTTP network access and low privileges, making internet-facing instances particularly vulnerable to exploitation.
🏢 Internal Only: MEDIUM - Internal attackers with legitimate low-privilege accounts could exploit this to escalate access to sensitive data they shouldn't normally see.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CVSS indicates 'easily exploitable' with low attack complexity. Requires authenticated access but only low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oracle Critical Patch Update for October 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2025.html

Restart Required: No

Instructions:

1. Review Oracle Critical Patch Update Advisory for October 2025. 2. Download and apply the appropriate patch for your Oracle BI Publisher version. 3. Test the patch in a non-production environment first. 4. Apply to production systems during maintenance windows.

🔧 Temporary Workarounds

Restrict Web Service API Access

all

Limit network access to the Web Service API endpoints to only trusted IP addresses or networks.

Configure firewall rules to restrict access to Oracle BI Publisher Web Service API ports (typically HTTP/HTTPS)

Reduce Low Privilege Accounts

all

Minimize the number of low-privilege accounts and review their access permissions.

Review and audit user accounts with low privileges in Oracle BI Publisher

🧯 If You Can't Patch

  • Implement network segmentation to isolate Oracle BI Publisher from untrusted networks
  • Enhance monitoring of Web Service API access patterns and alert on unusual data access

🔍 How to Verify

Check if Vulnerable:

Check your Oracle BI Publisher version against affected versions (7.6.0.0.0 or 8.2.0.0.0). Review Oracle advisory for specific patch availability.

Check Version:

Check Oracle BI Publisher administration console or use Oracle version checking utilities specific to your deployment.

Verify Fix Applied:

Verify patch installation through Oracle patch management tools and confirm version is no longer in vulnerable range.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Web Service API endpoints
  • Multiple data access attempts from low-privilege accounts
  • Access to sensitive reports/data by unauthorized users

Network Indicators:

  • HTTP requests to Web Service API endpoints from unexpected sources
  • Increased data transfer from Oracle BI Publisher

SIEM Query:

source="oracle-bi-publisher" AND (event_type="api_access" OR event_type="data_access") AND user_privilege="low" AND data_sensitivity="high"

🔗 References

📤 Share & Export