CVE-2025-30720Corporation Oracle Configurator vulnerability

4 documents4 sources
Severity
6.1MEDIUMNVD
EPSS
0.2%
top 61.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 15

Description

Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products (scope change). Successful

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

NVDoracle/configurator12.2.312.2.14
CVEListV5oracle_corporation/oracle_configurator12.2.312.2.14

🔴Vulnerability Details

2
CVEList
CVE-2025-30720: Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders)2025-04-15
GHSA
GHSA-8fmg-xgjm-9r26: Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders)2025-04-15

📋Vendor Advisories

1
Oracle
Oracle Oracle E-Business Suite Risk Matrix: Orders — CVE-2025-307202025-04-15
CVE-2025-30720 — MEDIUM severity | cvebase