Oracle Critical Patch Update Advisory - January 2026

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 337 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at January 2026 Critical Patch Update: Executive Summary and Analysis.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
JD Edwards EnterpriseOne Tools, versions 9.2.0.0-9.2.26.0 JD Edwards
MySQL Cluster, versions 7.6.0-7.6.36, 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0 MySQL
MySQL Connectors, versions 9.0.0-9.5.0 MySQL
MySQL Enterprise Backup, versions 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0 MySQL
MySQL Server, versions 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0 MySQL
MySQL Workbench, versions 8.0.0-8.0.45 MySQL
Oracle Access Manager, versions 12.2.1.4.0, 14.1.2.1.0 Fusion Middleware
Oracle Agile PLM, version 9.3.6 Oracle Supply Chain Products
Oracle Agile Product Lifecycle Management for Process, version 6.2.4 Oracle Supply Chain Products
Oracle APEX Sample Applications, versions 23.2.0, 23.2.1, 24.1.0, 24.2.0, 24.2.1 Database
Oracle Application Testing Suite, version 13.3.0.1 Oracle Enterprise Manager
Oracle Autovue for Agile Product Lifecycle Management, version 21.1.0 Oracle Supply Chain Products
Oracle AutoVue Office, version 21.1.0 Oracle Supply Chain Products
Oracle Banking Branch, versions 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0 Contact Support
Oracle Banking Cash Management, versions 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0 Contact Support
Oracle Banking Corporate Lending Process Management, versions 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0 Contact Support
Oracle Banking Liquidity Management, versions 14.5.0.14.0, 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0 Contact Support
Oracle Banking Supply Chain Finance, versions 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0 Contact Support
Oracle BI Publisher, versions 7.6.0.0.0, 8.2.0.0.0 Oracle Analytics
Oracle Business Intelligence Enterprise Edition, versions 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0 Oracle Analytics
Oracle Business Process Management Suite, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Cloud Native Session Border Controller, version 25.1.0 Oracle Cloud Native Session Border Controller
Oracle Coherence, versions 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle Commerce Guided Search, version 11.4.0 Oracle Commerce
Oracle Commerce Platform, version 11.4.0 Oracle Commerce
Oracle Communications ASAP, versions 7.4.0, 7.4.1 Oracle Communications ASAP
Oracle Communications Billing and Revenue Management, versions 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0 Oracle Communications Billing and Revenue Management
Oracle Communications BRM - Elastic Charging Engine, versions 15.0.0.0, 15.0.1.0, 15.1.0.0 Oracle Communications BRM - Elastic Charging Engine
Oracle Communications Diameter Signaling Router, versions 9.0.0, 9.0.1, 9.1.0 Oracle Communications Diameter Signaling Router
Oracle Communications Element Manager, versions 9.0.0-9.0.4 Oracle Communications Element Manager
Oracle Communications IP Service Activator, version 7.5.0 Oracle Communications IP Service Activator
Oracle Communications Network Analytics Data Director, versions 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100 Oracle Communications Network Analytics Data Director
Oracle Communications Network Integrity, versions 7.3.6, 7.4.0, 7.5.0, 8.0.0 Oracle Communications Network Integrity
Oracle Communications Operations Monitor, versions 5.2, 6.0, 6.1 Oracle Communications Operations Monitor
Oracle Communications Order and Service Management, versions 7.5.0, 8.0.0 Oracle Communications Order and Service Management
Oracle Communications Policy Management, version 15.0.0.0 Oracle Communications Policy Management
Oracle Communications Pricing Design Center, versions 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0 Oracle Communications Pricing Design Center
Oracle Communications Session Border Controller, versions 9.3.0, 10.0.0 Oracle Communications Session Border Controller
Oracle Communications Session Report Manager, versions 9.0.0-9.0.4 Oracle Communications Session Report Manager
Oracle Communications Unified Assurance, versions 6.1.0-6.1.1 Oracle Communications Unified Assurance
Oracle Communications Unified Inventory Management, versions 7.7.0, 7.8.0, 8.0.0 Oracle Communications Unified Inventory Management
Oracle Data Integrator, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Database Server, versions 19.3-19.29, 21.3-21.20, 23.4.0-23.26.0 Database
Oracle E-Business Suite, versions 12.2.3-12.2.15 Oracle E-Business Suite
Oracle Enterprise Communications Broker, versions 4.1.0, 4.2.0, 5.0.0 Oracle Enterprise Communications Broker
Oracle Enterprise Manager Base Platform, versions 13.5, 24.1 Oracle Enterprise Manager
Oracle Essbase, version 21.8.0.0.0 Database
Oracle Financial Services Compliance Studio, version 2.6.0 Oracle Financial Services Compliance Studio
Oracle Financial Services Model Management and Governance, version 8.1.3.2 Oracle Financial Services Model Management and Governance
Oracle FLEXCUBE Investor Servicing, versions 14.5.0.15.0, 14.7.0.8.0, 14.8.0.1.0 Contact Support
Oracle FLEXCUBE Universal Banking, versions 14.0.0.0.0-14.8.0.0.0 Contact Support
Oracle Fusion Middleware, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Global Lifecycle Management NextGen OUI Framework, version 15.1.1.0.0 Fusion Middleware
Oracle GoldenGate, versions 19.1.0.0.0-19.29.0.0.251021, 21.3-21.20, 23.4-23.10 Database
Oracle GoldenGate Big Data and Application Adapters, versions 19.1.0.0.0-19.1.0.0.20, 21.3-21.20, 23.4-23.10 Database
Oracle GoldenGate Stream Analytics, versions 19.1.0.0.0-19.1.0.0.13 Database
Oracle GoldenGate Studio, versions 23.8.0-23.9.0 Database
Oracle GoldenGate Veridata, versions 12.2.1.4.0-12.2.1.4.250531 Database
Oracle GraalVM Enterprise Edition, version 21.3.16 Java SE
Oracle GraalVM for JDK, versions 17.0.17, 21.0.9 Java SE
Oracle Graph Server and Client, versions 24.4.4, 25.4.0 Database
Oracle Health Sciences Information Manager, version 4.0.0 HealthCare Applications
Oracle Healthcare Data Repository, versions 8.2.0.5, 8.2.0.6 HealthCare Applications
Oracle Healthcare Master Person Index, versions 5.0.0.0-5.0.9.5 HealthCare Applications
Oracle Hospitality OPERA 5 Property Services, versions 5.6.19, 5.6.25, 5.6.26, 5.6.27 Oracle Hospitality OPERA 5 Property Services
Oracle HTTP Server, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 Fusion Middleware
Oracle Hyperion Calculation Manager, version 11.2.23 Oracle Enterprise Performance Management
Oracle Hyperion Financial Close Management, version 11.2.23 Oracle Enterprise Performance Management
Oracle Hyperion Financial Management, version 11.2.23 Oracle Enterprise Performance Management
Oracle Hyperion Financial Reporting, version 11.2.23 Oracle Enterprise Performance Management
Oracle Hyperion Infrastructure Technology, version 11.2.23 Oracle Enterprise Performance Management
Oracle Hyperion Planning, version 11.2.23 Oracle Enterprise Performance Management
Oracle Hyperion Profitability and Cost Management, version 11.2.23 Oracle Enterprise Performance Management
Oracle Identity Manager, versions 12.2.1.4.0, 14.1.2.1.0 Fusion Middleware
Oracle Identity Manager Connector, versions 12.2.1.4.0, 14.1.2.1.0 Fusion Middleware
Oracle Insurance Policy Administration J2EE, versions 11.3.1-12.0.6 Oracle Insurance Applications
Oracle Java SE, versions 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1 Java SE
Oracle JDK Mission Control, version 9.1.1 Java SE
Oracle Key Vault, versions 21.1.0.0.0-21.11.0.0.0 Database
Oracle Life Sciences Central Coding, version 7.0.1.0 Health Sciences
Oracle Life Sciences Central Designer, version 7.0.1.0 Health Sciences
Oracle Managed File Transfer, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Middleware Common Libraries and Tools, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle NoSQL Database, versions 1.5, 1.6 Database
Oracle Outside In Technology, versions 8.5.7, 8.5.8 Fusion Middleware
Oracle Planning and Budgeting Cloud Service, version 25.4.7 Oracle Enterprise Performance Management
Oracle Retail Advanced Inventory Planning, versions 15.0.3, 16.0.3 Retail Applications
Oracle Retail Allocation, versions 15.0.3, 16.0.3 Retail Applications
Oracle Retail Bulk Data Integration, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Financial Integration, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Fiscal Management, version 14.2 Retail Applications
Oracle Retail Integration Bus, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Predictive Application Server, versions 15.0.3, 16.0.3 Retail Applications
Oracle Retail Service Backbone, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Xstore Office, version 25.0.1 Retail Applications
Oracle Retail Xstore Point of Service, versions 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0 Retail Applications
Oracle Secure Backup, versions 19.1.0.0.0-19.1.0.1.0 Database
Oracle Security Service, version 12.2.1.4.0 Fusion Middleware
Oracle Service Bus, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle SOA Suite, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle Solaris, versions 10, 11 Systems
Oracle TimesTen In-Memory Database, versions 22.1.1.1.0-22.1.1.35.0 Database
Oracle Unified Directory, versions 12.2.1.4.0, 14.1.2.1.0 Fusion Middleware
Oracle Utilities Application Framework, versions 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10 Oracle Utilities Applications
Oracle Utilities Network Management System, versions 2.5.0.1.16, 2.5.0.2.10, 2.6.0.1.9, 2.6.0.2.5 Oracle Utilities Applications
Oracle Utilities Testing Accelerator, versions 7.0.0.0.6, 7.0.0.1.4, 25.4.0.0.1 Oracle Utilities Applications
Oracle VM VirtualBox, versions 7.1.14, 7.2.4 Virtualization
Oracle WebCenter Enterprise Capture, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle WebCenter Sites, versions 12.2.1.4.0, 14.1.2.0.0 Fusion Middleware
Oracle WebLogic Server, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0 Fusion Middleware
Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle Zero Data Loss Recovery Appliance Software, versions 23.1.0-23.1.202509 Database
Oracle ZFS Storage Appliance Kit, version 8.8 Systems
PeopleSoft Enterprise HCM Human Resources, version 9.2 PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.60, 8.61, 8.62 PeopleSoft
PeopleSoft Enterprise SCM Purchasing, version 9.2 PeopleSoft
Primavera Gateway, versions 21.12.0-21.12.16 Oracle Construction and Engineering Suite
Primavera P6 Enterprise Project Portfolio Management, versions 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0 Oracle Construction and Engineering Suite
Primavera Unifier, versions 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0 Oracle Construction and Engineering Suite
Service Delivery Platform, version 14.1.2.0.0 Fusion Middleware
Siebel Applications, versions 17.0-25.11 Siebel

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE ID. A vulnerability that affects multiple products will appear with the same CVE ID in all risk matrices.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about conditions required to exploit the vulnerability and the potential impact of a successful exploit. Oracle provides this information so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Third party component vulnerabilities that are deemed not exploitable in the context of their inclusion in an Oracle product are listed, with VEX justifications, below the respective Oracle product's risk matrix.

The protocol in the risk matrix implies that all of its secure variants are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy that further supplements the Lifetime Support Policy as explained in My Oracle Support Note KB65129. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • Akira Hachiya: CVE-2026-21939
  • Alexander Kornbrust of Red Database Security: CVE-2026-21958, CVE-2026-21977
  • Anton Fedorov: CVE-2026-21968
  • Ao Wang of Southeast University: CVE-2026-21928, CVE-2026-21982
  • Eangly Roeurn: CVE-2026-21978
  • fstmpr: CVE-2026-21989, CVE-2026-21990
  • haidv35 (Dinh Viet Hai) of Viettel Cyber Security: CVE-2026-21944
  • Ireneusz Pastusiak: CVE-2026-21945
  • Jingzhou Fu of WingTecher Lab of Tsinghua University: CVE-2026-21949, CVE-2026-21950
  • Kanika Jalal: CVE-2026-21931
  • Kritnarong Samertung: CVE-2026-21973
  • Kush Jijania: CVE-2026-21924
  • Maxime Escourbiac of Michelin CERT: CVE-2026-21959, CVE-2026-21960
  • Mingijung of WebSec Lab: CVE-2026-21932
  • Mohammed Ba Rashed: CVE-2026-21986
  • Muhammad Zeeshan (Xib3rR4dAr): CVE-2026-21943
  • NiNi (terrynini38514) from DEVCORE Research Team working with Trend Micro Zero Day Initiative: CVE-2026-21957
  • Patrick Murphy of Lockheed Martin Red Team: CVE-2026-21922, CVE-2026-21979
  • Phudq of Viettel Cybersecurity working with Trend Zero Day Initiative: CVE-2026-21985
  • PwC HK Darklab: CVE-2026-21966, CVE-2026-21967
  • Ryan Brothers: CVE-2026-21948
  • Ved Prabhu: CVE-2026-21931
  • Viettel Cyber Security working with Trend Micro Zero Day Initiative: CVE-2026-21963
  • VMBreakers (Gangmin Kim, Sangbin Kim, Un3xploitable) working with Trend Micro Zero Day Initiative: CVE-2026-21955, CVE-2026-21956, CVE-2026-21984
  • Xiaobye (xiaobye_tw) of DEVCORE Research Team working with Trend Micro Zero Day Initiative: CVE-2026-21983
  • Yassine Bengana of Michelin CERT: CVE-2026-21959, CVE-2026-21960
  • Yuhao Jiang: CVE-2026-21981
  • Zhenghao Li of ISCAS: CVE-2026-21987, CVE-2026-21988
  • Zhihui Chen: CVE-2026-21933
  • Zhiyong Wu of WingTecher Lab of Tsinghua University: CVE-2026-21949, CVE-2026-21950
  • Zpt_dxpn of Pentest Team Viettel Cyber Security: CVE-2026-21969

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:

  • Akira Hachiya
  • Jan Starke
  • Karan Bamal

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.

For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:

  • Abdulhadi Arif Alshammari
  • Ammar Albarakati
  • Avanish Pathak
  • Ayşenur Demiral
  • Bryon Wolcott
  • Emad Al-Mousa of Saudi Aramco's Upstream Digital Center (UDC) [2 reports]
  • Garreth Kelsey
  • Gouri Sankar A
  • Jiehao Zhang (Water1sec)
  • Keisuke Inoue of LAC Co., Ltd.
  • Kristen Duchrow
  • Mike Khytko of Alerts Bar Inc
  • Pherry874
  • Reiji Nishimura of LAC Co., Ltd.
  • Richard Fichtner
  • Surya Arigela
  • Yosuke Totani of LAC Co., Ltd

Critical Patch Update Schedule

Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 21 April 2026
  • 21 July 2026
  • 20 October 2026
  • 19 January 2027

References

 

Modification History

Date Note
2026-January-20 Rev 1. Initial Release.

 

Oracle Database Products Risk Matrices

This Critical Patch Update contains 18 new security patches for Oracle Database Products divided as follows:

  • 7 new security patches for Oracle Database Products
  • 1 new security patch for Oracle APEX
  • 1 new security patch for Oracle Essbase
  • 5 new security patches for Oracle GoldenGate
  • 1 new security patch for Oracle Graph Server and Client
  • No new security patches for Oracle Key Vault, but third party patches are provided
  • 1 new security patch for Oracle NoSQL Database
  • 1 new security patch for Oracle Secure Backup
  • No new security patches for Oracle TimesTen In-Memory Database, but third party patches are provided
  • 1 new security patch for Oracle Zero Data Loss Recovery Appliance

 

Oracle Database Server Risk Matrix

This Critical Patch Update contains 7 new security patches, plus additional third party patches noted below, for Oracle Database Products.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE ID Component Package and/or Privilege Required Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-12383 Fleet Patching and Provisioning (Eclipse Jersey) None HTTP Yes 7.4 Network High None None Un-
changed
High High None 23.4.0-23.26.0  
CVE-2026-21939 SQLcl None None No 7.0 Local High None Required Un-
changed
High High High 23.4.0-23.26.0  
CVE-2025-8194 RDBMS (Python) Authenticated User None No 6.7 Local Low High None Un-
changed
High High High 21.3-21.20, 23.4.0-23.26.0  
CVE-2025-67735 Oracle Graal Development Kit for Micronaut (Nimbus JOSE+JWT) Authenticated User Oracle Net Yes 6.5 Network Low None None Un-
changed
Low Low None 19.3-19.29, 23.4.0-23.26.0  
CVE-2026-21975 Java VM Authenticated User Oracle Net No 4.5 Network Low High Required Un-
changed
None None High 19.3-19.29, 21.3-21.20  
CVE-2025-61755 GraalVM Multilingual Engine Create Session Multiple No 3.1 Network High Low None Un-
changed
Low None None 21.3-21.20, 23.4.0-23.26.0  
CVE-2025-54874 Oracle Spatial and Graph (OpenJPEG) None None No 2.8 Local Low Low Required Un-
changed
None None Low 23.4.0-23.26.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-8194 also addresses CVE-2025-13836, CVE-2025-13837, CVE-2025-6069, CVE-2025-6075, CVE-2025-8291, and CVE-2025-8869.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Database (Apache Tomcat): CVE-2025-61795 and CVE-2025-55754 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle Database Security (OpenSSL): CVE-2025-9230, CVE-2025-9231 and CVE-2025-9232 [VEX Justification: vulnerable_code_not_in_execute_path].

Oracle Database Server Client-Only Installations

  • The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2026-21939.

 

Oracle APEX Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle APEX.  This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21931 Oracle APEX Sample Applications Brookstrut Sample App HTTP No 5.4 Network Low Low Required Changed Low Low None 23.2.0, 23.2.1, 24.1.0, 24.2.0, 24.2.1  

 

Oracle Essbase Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Essbase.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-66566 Oracle Essbase Essbase Web Platform (lz4-java) Multiple Yes 7.5 Network Low None None Un-
changed
High None None 21.8.0.0.0  

 

Oracle GoldenGate Risk Matrix

This Critical Patch Update contains 5 new security patches, plus additional third party patches noted below, for Oracle GoldenGate.  3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-59250 Oracle GoldenGate Big Data and Application Adapters Java Delivery (JDBC Driver for SQL Server) Multiple Yes 8.1 Network Low None Required Un-
changed
High High None 21.3-21.20, 23.4-23.10  
CVE-2025-59419 Oracle GoldenGate Big Data and Application Adapters Java Delivery (Netty) HTTP No 6.5 Network Low Low None Un-
changed
None None High 21.3-21.20, 23.4-23.10  
CVE-2025-55039 Oracle GoldenGate Stream Analytics General (Apache Spark) Multiple Yes 6.5 Network Low None None Un-
changed
Low Low None 19.1.0.0.0-19.1.0.0.11  
CVE-2025-68161 Oracle GoldenGate Big Data and Application Adapters Third Party (Apache Log4j) TLS Yes 5.4 Network High None None Changed Low Low None 19.1.0.0.0-19.1.0.0.20, 21.3-21.20, 23.4-23.10  
CVE-2025-48924 Oracle GoldenGate Stream Analytics General (Apache Commons Lang) HTTP No 4.3 Network Low Low None Un-
changed
None None Low 19.1.0.0.0-19.1.0.0.11  

Additional CVEs addressed are:

  • The patch for CVE-2025-59419 also addresses CVE-2025-58056 and CVE-2025-58057.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle GoldenGate
    • Embedded Web UI for Services (Axios): CVE-2025-58754 and CVE-2025-27152 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Libraries (BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Big Data and Application Adapters
    • Java Delivery (Apache Commons IO): CVE-2024-47554 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Stream Analytics
    • General (urllib3): CVE-2025-66418 and CVE-2025-66471 [VEX Justification: vulnerable_code_not_in_execute_path].
    • General (Requests): CVE-2024-35195 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Studio
    • OGG Orchestration Service (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].
    • OGG Orchestration Service (logback): CVE-2023-6378 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle GoldenGate Veridata
    • Third Party (Apache Commons FileUpload): CVE-2025-48976 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Graph Server and Client Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Graph Server and Client.  This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-61795 Oracle Graph Server and Client Packaging (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 24.4.4, 25.4.0  

 

Oracle Key Vault Risk Matrix

This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Key Vault.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Key Vault.  The English text form of this Risk Matrix can be found here.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Key Vault
    • General Server/Appliance: CVE-2026-21958 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].

 

Oracle NoSQL Database Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle NoSQL Database.  This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-30065 Oracle NoSQL Database Administration (Apache Parquet Java) None No 7.0 Local High Low None Un-
changed
High High High 1.5, 1.6  

 

Oracle Secure Backup Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Secure Backup.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-65082 Oracle Secure Backup Oracle Secure Backup (Apache HTTP Server) HTTP Yes 6.5 Network Low None None Un-
changed
Low Low None 19.1.0.0.0-19.1.0.1.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-65082 also addresses CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, and CVE-2025-66200.

 

Oracle TimesTen In-Memory Database Risk Matrix

This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle TimesTen In-Memory Database.  Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle TimesTen In-Memory Database.  The English text form of this Risk Matrix can be found here.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle TimesTen In-Memory Database
    • Kubernetes Operator (Golang Go): CVE-2025-47910 [VEX Justification: vulnerable_code_not_in_execute_path].
    • Install (BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Zero Data Loss Recovery Appliance Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Zero Data Loss Recovery Appliance.  This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21977 Oracle Zero Data Loss Recovery Appliance Software Security Oracle Net Yes 3.1 Network High None Required Un-
changed
Low None None 23.1.0-23.1.202509  

 

Oracle Commerce Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Commerce.  6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-66516 Oracle Commerce Guided Search Workbench (Apache Tika) HTTP Yes 10.0 Network Low None None Changed High High High 11.4.0  
CVE-2025-50059 Oracle Commerce Guided Search Content Acquisition System, Workbench, Endeca Application Controller (Oracle Java SE) HTTP Yes 8.6 Network Low None None Changed High None None 11.4.0  
CVE-2025-41249 Oracle Commerce Guided Search Content Acquisition System, Workbench, Endeca Application Controller (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 11.4.0  
CVE-2025-9086 Oracle Commerce Guided Search MDEX, Forge (curl) HTTPS Yes 7.5 Network Low None None Un-
changed
None None High 11.4.0  
CVE-2025-41249 Oracle Commerce Platform Dynamo Application Framework (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 11.4.0  
CVE-2025-61795 Oracle Commerce Guided Search Content Acquisition System, Workbench, Endeca Application Controller (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 11.4.0  
CVE-2025-48924 Oracle Commerce Platform Dynamo Application Framework (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.4.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-41249 also addresses CVE-2025-41242.
  • The patch for CVE-2025-9086 also addresses CVE-2025-10148.

 

Oracle Communications Risk Matrix

This Critical Patch Update contains 56 new security patches for Oracle Communications.  34 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-66516 Oracle Communications Order and Service Management Security (Apache Tika) HTTP Yes 10.0 Network Low None None Changed High High High 7.5.0, 8.0.0  
CVE-2025-49844 Oracle Communications Operations Monitor Infrastructure (valkey) HTTP No 9.9 Network Low Low None Changed High High High 5.2  
CVE-2025-48734 Oracle Communications Policy Management Configuration Management Platform (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 15.0.0.0  
CVE-2025-9900 Oracle Communications Policy Management Configuration Management Platform (LibTIFF) HTTP Yes 8.8 Network Low None Required Un-
changed
High High High 15.0.0.0  
CVE-2025-66516 Oracle Communications Unified Assurance Core (Apache Tika) HTTP No 8.4 Network Low High Required Changed High High High 6.1.0-6.1.1  
CVE-2025-32990 Oracle Communications Network Analytics Data Director Platform (GnuTLS) HTTP Yes 8.2 Network Low None None Un-
changed
None Low High 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200  
CVE-2025-32990 Oracle Communications Policy Management Configuration Management Platform (GnuTLS) HTTP Yes 8.2 Network Low None None Un-
changed
None Low High 15.0.0.0  
CVE-2025-5987 Oracle Enterprise Communications Broker Routing (libssh) SSH Yes 8.1 Network High None None Un-
changed
High High High 4.2.0, 5.0.0  
CVE-2025-58057 Oracle Cloud Native Session Border Controller Security (Netty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 25.1.0  
CVE-2025-48060 Oracle Cloud Native Session Border Controller Third Party (jq) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 25.1.0  
CVE-2025-41249 Oracle Communications BRM - Elastic Charging Engine Security (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 15.1.0.0  
CVE-2025-8194 Oracle Communications Diameter Signaling Router Automated Test Suite (Python) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0, 9.0.1, 9.1.0  
CVE-2025-27533 Oracle Communications Element Manager Third Party (Apache ActiveMQ) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0-9.0.4  
CVE-2025-48976 Oracle Communications Element Manager Third Party (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0-9.0.4  
CVE-2025-59375 Oracle Communications Network Analytics Data Director Third Party (LibExpat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100  
CVE-2025-41249 Oracle Communications Network Integrity Platform, MSS Cartridge (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 7.3.6, 7.4.0, 7.5.0  
CVE-2025-66418 Oracle Communications Operations Monitor Mediation Engine (urllib3) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 5.2, 6.0, 6.1  
CVE-2025-48976 Oracle Communications Policy Management Configuration Management Platform (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 15.0.0.0  
CVE-2025-8194 Oracle Communications Session Border Controller Routing (Python) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.3.0, 10.0.0  
CVE-2025-27533 Oracle Communications Session Report Manager Third Party (Apache ActiveMQ) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0-9.0.4  
CVE-2025-48976 Oracle Communications Session Report Manager Third Party (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0-9.0.4  
CVE-2025-46727 Oracle Communications Unified Assurance Core (Rack) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-8194 Oracle Communications Unified Inventory Management Security (Python) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.7.0, 7.8.0, 8.0.0  
CVE-2025-66418 Oracle Communications Unified Inventory Management Security (urllib3) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.7.0, 7.8.0, 8.0.0  
CVE-2025-8194 Oracle Enterprise Communications Broker Routing (Python) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 4.1.0, 4.2.0, 5.0.0  
CVE-2025-32988 Oracle Cloud Native Session Border Controller Third Party (GnuTLS) TLS Yes 6.5 Network High None None Un-
changed
None Low High 25.1.0  
CVE-2025-58098 Oracle Communications Unified Assurance Core (Apache HTTP Server) HTTP No 6.4 Network Low High Required Un-
changed
High High Low 6.1.0-6.1.1  
CVE-2025-54571 Oracle Communications Unified Assurance Core (ModSecurity) HTTP Yes 6.1 Network Low None Required Changed Low Low None 6.1.0-6.1.1  
CVE-2025-26333 Oracle Communications Billing and Revenue Management Platform (BSAFE Crypto-J) HTTP Yes 5.9 Network High None None Un-
changed
High None None 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0  
CVE-2025-65018 Oracle Communications Unified Assurance Core (libpng) None No 5.8 Local Low High Required Un-
changed
None High High 6.1.0-6.1.1  
CVE-2025-25193 Oracle Communications BRM - Elastic Charging Engine Security (Netty) None No 5.5 Local Low Low None Un-
changed
None None High 15.0.0.0, 15.0.1.0  
CVE-2025-68161 Oracle Communications IP Service Activator Logging (Apache Log4j) TLS Yes 5.4 Network High None None Changed Low Low None 7.5.0  
CVE-2025-5318 Oracle Communications Network Analytics Data Director Security (libssh) HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100  
CVE-2025-5318 Oracle Communications Policy Management Configuration Management Platform (libssh) HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 15.0.0.0  
CVE-2025-5318 Oracle Communications Pricing Design Center On-premise Deployment (libssh) HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0  
CVE-2025-5318 Oracle Communications Unified Assurance Core (libssh) HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 6.1.0-6.1.1  
CVE-2025-48924 Oracle Cloud Native Session Border Controller Third Party (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 25.1.0  
CVE-2025-48924 Oracle Communications ASAP Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 7.4.0, 7.4.1  
CVE-2025-48924 Oracle Communications Element Manager Third Party (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 9.0.0-9.0.4  
CVE-2025-61795 Oracle Communications Element Manager Web UI (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 9.0.0-9.0.4  
CVE-2025-48924 Oracle Communications IP Service Activator System (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 7.5.0  
CVE-2025-48924 Oracle Communications Policy Management Configuration Management Platform (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 15.0.0.0  
CVE-2025-61795 Oracle Communications Policy Management Configuration Management Platform (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 15.0.0.0  
CVE-2025-48924 Oracle Communications Session Report Manager Third Party (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 9.0.0-9.0.4  
CVE-2025-61795 Oracle Communications Session Report Manager Third Party (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 9.0.0-9.0.4  
CVE-2024-12133 Oracle Communications Unified Assurance Core (Libtasn1) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 6.1.0-6.1.1  
CVE-2025-5115 Oracle Communications Unified Assurance Core (Eclipse Jetty) HTTP/2 No 4.9 Network Low High None Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-55163 Oracle Communications Unified Assurance Core (Netty) HTTP/2 No 4.9 Network Low High None Un-
changed
None High None 6.1.0-6.1.1  
CVE-2025-68161 Oracle Communications Network Integrity Logging (Apache Log4j) TLS Yes 4.8 Network High None None Un-
changed
Low Low None 7.3.6, 7.4.0, 7.5.0, 8.0.0  
CVE-2025-59375 Oracle Communications Unified Assurance Core (LibExpat) HTTP No 4.5 Network Low High Required Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-8194 Oracle Communications Unified Assurance Core (Python) HTTP No 4.5 Network Low High Required Un-
changed
None None High 6.1.0-6.1.1  
CVE-2024-46901 Oracle Communications Unified Assurance Core (Apache Subversion) HTTP No 4.3 Network Low Low None Un-
changed
None None Low 6.1.0-6.1.1  
CVE-2025-61795 Oracle Communications Unified Assurance Core (Apache Tomcat) HTTP No 4.2 Network High High Required Un-
changed
None None High 6.1.0-6.1.1  
CVE-2025-55163 Oracle Communications Network Analytics Data Director Security (Netty) HTTP/2 No 3.1 Network High Low None Un-
changed
None None Low 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100  
CVE-2025-64718 Oracle Communications Unified Assurance Core (node-forge) HTTP No 2.4 Network Low High Required Un-
changed
None Low None 6.1.0-6.1.1  
CVE-2025-8916 Oracle Communications Unified Assurance Core (Bouncy Castle Java Library) HTTPS No 2.4 Network Low High Required Un-
changed
None None Low 6.1.0-6.1.1  

Additional CVEs addressed are:

  • The patch for CVE-2025-64718 also addresses CVE-2025-12816.
  • The patch for CVE-2025-48060 also addresses CVE-2024-23337.
  • The patch for CVE-2025-66418 also addresses CVE-2025-66471.
  • The patch for CVE-2024-46901 also addresses CVE-2024-45720.
  • The patch for CVE-2025-9900 also addresses CVE-2025-8176, CVE-2025-8177, and CVE-2025-8961.
  • The patch for CVE-2025-5318 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, CVE-2025-5449, and CVE-2025-5987.
  • The patch for CVE-2025-32990 also addresses CVE-2025-32988, CVE-2025-32989, CVE-2025-5318, and CVE-2025-6395.
  • The patch for CVE-2025-41249 also addresses CVE-2025-22233, CVE-2025-41234, and CVE-2025-41242.
  • The patch for CVE-2025-65018 also addresses CVE-2025-64505, CVE-2025-64506, and CVE-2025-64720.
  • The patch for CVE-2025-58098 also addresses CVE-2025-55753, CVE-2025-59775, CVE-2025-65082, and CVE-2025-66200.
  • The patch for CVE-2025-55163 also addresses CVE-2025-58056.
  • The patch for CVE-2025-8194 also addresses CVE-2025-6069.
  • The patch for CVE-2025-5987 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, and CVE-2025-5449.
  • The patch for CVE-2025-49844 also addresses CVE-2025-46817, CVE-2025-46818, and CVE-2025-46819.

 

Oracle Construction and Engineering Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle Construction and Engineering.  7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2021-43113 Primavera Unifier Reports (iTextPDF) HTTPS Yes 9.8 Network Low None None Un-
changed
High High High 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0  
CVE-2025-66516 Primavera Unifier Integration (Apache Tika) HTTP Yes 8.3 Network Low None None Changed Low Low Low 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0  
CVE-2025-41249 Primavera Gateway Admin (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 21.12.0-21.12.16  
CVE-2025-41249 Primavera Unifier Integration (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0  
CVE-2025-48795 Primavera P6 Enterprise Project Portfolio Management Integrators (Apache CXF) HTTP Yes 5.6 Network High None None Un-
changed
Low Low Low 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0  
CVE-2025-68161 Primavera Gateway Admin (Apache Log4j) TLS Yes 5.4 Network High None None Changed Low Low None 21.12.0-21.12.16  
CVE-2025-26791 Primavera P6 Enterprise Project Portfolio Management Team Member (DOMPurify) None No 3.9 Local High Low Required Changed Low Low None 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0  
CVE-2025-48734 Primavera P6 Enterprise Project Portfolio Management Web Access (Apache Commons BeanUtils) HTTP/2 Yes 3.7 Network High None None Un-
changed
Low None None 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.6.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-41249 also addresses CVE-2025-41242.

 

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle E-Business Suite.  2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the January 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (January 2026), My Oracle Support Note KA923.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Field Service HTML Dispatch Center (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 12.2.3-12.2.15  
CVE-2025-48734 Oracle Human Resources iRecruitment (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 12.2.3-12.2.15  
CVE-2025-48734 Oracle Succession planning Suitability Analyzer (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 12.2.3-12.2.15  
CVE-2025-48734 Oracle Time and Labor Core (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 12.2.3-12.2.15  
CVE-2026-21960 Oracle Applications DBA Java utils HTTP No 6.5 Network Low High None Un-
changed
High High None 12.2.3-12.2.15  
CVE-2026-21943 Oracle Scripting Scripting Admin HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.3-12.2.15  
CVE-2026-21972 Oracle Configurator User Interface HTTP Yes 5.3 Network Low None None Un-
changed
Low None None 12.2.3-12.2.15  
CVE-2026-21959 Oracle Workflow Workflow Loader HTTP No 4.9 Network Low High None Un-
changed
High None None 12.2.3-12.2.15  

 

Oracle Enterprise Manager Risk Matrix

This Critical Patch Update contains 4 new security patches for Oracle Enterprise Manager.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the January 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2026 Patch Availability Document for Oracle Products, My Oracle Support Note CPU6.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2024-13009 Oracle Enterprise Manager Base Platform Gateway (Eclipse Jetty) HTTP Yes 7.2 Network Low None None Changed Low Low None 24.1  
CVE-2024-13009 Oracle Enterprise Manager Base Platform Oracle Enterprise Manager Base Platform - Agent Next Gen (Eclipse Jetty) HTTP Yes 7.2 Network Low None None Changed Low Low None 13.5, 24.1  
CVE-2025-48924 Oracle Application Testing Suite Load Testing for Web Apps (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 13.3.0.1  
CVE-2025-48924 Oracle Enterprise Manager Base Platform Agent Next Gen (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 13.5, 24.1  

 

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 38 new security patches for Oracle Financial Services Applications.  33 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-49796 Oracle Banking Branch Reports (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0  
CVE-2025-49796 Oracle Banking Cash Management Accessibility (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 14.8.1.0.0  
CVE-2025-49796 Oracle Banking Corporate Lending Process Management Base (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0  
CVE-2025-49796 Oracle Banking Liquidity Management Common Core (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 14.8.1.0.0  
CVE-2025-49796 Oracle Banking Supply Chain Finance Security (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 14.8.1.0.0  
CVE-2025-48734 Oracle Banking Cash Management Accessibility (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-48734 Oracle Banking Liquidity Management Common Core (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2026-21973 Oracle FLEXCUBE Investor Servicing Security Management System HTTP No 8.1 Network Low Low None Un-
changed
High High None 14.5.0.15.0, 14.7.0.8.0, 14.8.0.1.0  
CVE-2025-5115 Oracle Banking Branch Reports (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0  
CVE-2025-48976 Oracle Banking Cash Management Accessibility (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-27817 Oracle Banking Cash Management Accessibility (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-5115 Oracle Banking Cash Management Accessibility (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-55163 Oracle Banking Cash Management Accessibility (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-9230 Oracle Banking Cash Management Accessibility (OpenSSL) HTTPS Yes 7.5 Network Low None None Un-
changed
None None High 14.8.1.0.0  
CVE-2025-5115 Oracle Banking Corporate Lending Process Management Base (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0  
CVE-2025-48976 Oracle Banking Liquidity Management Common Core (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-27817 Oracle Banking Liquidity Management Common Core (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-5115 Oracle Banking Liquidity Management Common Core (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-55163 Oracle Banking Liquidity Management Common Core (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-9230 Oracle Banking Liquidity Management Common Core (OpenSSL) HTTPS Yes 7.5 Network Low None None Un-
changed
None None High 14.8.1.0.0  
CVE-2025-5115 Oracle Banking Supply Chain Finance Security (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-55163 Oracle Banking Supply Chain Finance Security (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-9230 Oracle Banking Supply Chain Finance Security (OpenSSL) HTTPS Yes 7.5 Network Low None None Un-
changed
None None High 14.8.1.0.0  
CVE-2025-41249 Oracle Financial Services Compliance Studio Reports (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 2.6.0  
CVE-2025-66418 Oracle Financial Services Compliance Studio Reports (urllib3) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 2.6.0  
CVE-2025-41249 Oracle Financial Services Model Management and Governance Installer (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.1.3.2  
CVE-2025-41248 Oracle Financial Services Model Management and Governance Installer (Spring Security) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.1.3.2  
CVE-2025-22228 Oracle Banking Liquidity Management Common Core (Spring Security) HTTP Yes 7.4 Network High None None Un-
changed
High High None 14.5.0.14.0  
CVE-2026-21978 Oracle FLEXCUBE Universal Banking Relationship Pricing HTTP No 6.5 Network Low Low None Un-
changed
High None None 14.0.0.0.0-14.8.0.0.0  
CVE-2025-48795 Oracle Banking Cash Management Accessibility (Apache CXF) HTTP Yes 5.6 Network High None None Un-
changed
Low Low Low 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-48795 Oracle Banking Liquidity Management Common Core (Apache CXF) HTTP Yes 5.6 Network High None None Un-
changed
Low Low Low 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-48924 Oracle Banking Branch Reports (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0  
CVE-2025-48924 Oracle Banking Cash Management Accessibility (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-48924 Oracle Banking Corporate Lending Process Management Base (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0  
CVE-2025-48924 Oracle Banking Liquidity Management Common Core (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-48924 Oracle Banking Supply Chain Finance Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0  
CVE-2025-61795 Oracle Financial Services Model Management and Governance Installer (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 8.1.3.2  
CVE-2025-48924 Oracle Insurance Policy Administration J2EE Architecture (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.3.1-12.0.6  

Additional CVEs addressed are:

  • The patch for CVE-2025-66418 also addresses CVE-2025-66471.
  • The patch for CVE-2025-27817 also addresses CVE-2025-27818.
  • The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
  • The patch for CVE-2025-9230 also addresses CVE-2025-9231 and CVE-2025-9232.

 

Oracle Fusion Middleware Risk Matrix

This Critical Patch Update contains 51 new security patches for Oracle Fusion Middleware.  47 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

To get the full list of current and previously released Critical Patch Update patches for Oracle Fusion Middleware products, refer to My Oracle Support Doc ID KA1182.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-66516 Oracle Business Process Management Suite Runtime Engine (Apache Tika) HTTP Yes 10.0 Network Low None None Changed High High High 12.2.1.4.0, 14.1.2.0.0  
CVE-2026-21962 Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS HTTP Yes 10.0 Network Low None None Changed High High None 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 See Note 1
CVE-2025-66516 Oracle Middleware Common Libraries and Tools Third Party (Apache Tika) HTTP Yes 10.0 Network Low None None Changed High High High 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-54988 Oracle Business Process Management Suite Oracle Business Rules (Apache Commons Compress) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 14.1.2.0.0  
CVE-2025-4949 Oracle Data Integrator Security (Eclipse JGit) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 14.1.2.0.0  
CVE-2025-4949 Oracle Fusion Middleware Oracle Database Client for Fusion Middleware (Eclipse JGit) Multiple Yes 9.8 Network Low None None Un-
changed
High High High 14.1.2.0.0  
CVE-2025-54874 Oracle Outside In Technology Core (OpenJPEG) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 8.5.7, 8.5.8  
CVE-2025-49796 Oracle HTTP Server Core (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-23048 Oracle HTTP Server SSL Module (Apache HTTP Server) TLS Yes 9.1 Network Low None None Un-
changed
High High None 14.1.2.0.0  
CVE-2024-56406 Oracle Fusion Middleware Third Party (Perl) HTTP Yes 8.6 Network Low None None Un-
changed
Low Low High 12.2.1.4.0, 14.1.2.0.0  
CVE-2022-41342 Oracle Access Manager Webserver Plugin (Intel C++ Compiler Classic) None No 7.8 Local Low Low None Un-
changed
High High High 12.2.1.4.0  
CVE-2022-41342 Oracle Fusion Middleware Dynamic Monitoring Service, Oracle Notification Service, libiau (Intel C++ Compiler Classic) None No 7.8 Local Low Low None Un-
changed
High High High 12.2.1.4.0 See Note 2
CVE-2022-41342 Oracle HTTP Server Core (Intel C++ Compiler Classic) None No 7.8 Local Low Low None Un-
changed
High High High 12.2.1.4.0 See Note 2
CVE-2022-41342 Oracle Weblogic Server Proxy Plug-in Oracle Weblogic Server Proxy Plug-in for Apache HTTP Server (Intel C++ Compiler Classic) None No 7.8 Local Low Low None Un-
changed
High High High 12.2.1.4.0, 14.1.1.0.0 See Note 2
CVE-2025-48976 Oracle Business Process Management Suite Composer (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-5115 Oracle Coherence Centralized Third Party Jars (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.1.0.0  
CVE-2025-55163 Oracle Data Integrator Runtime Java agent (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0  
CVE-2024-42516 Oracle HTTP Server Core (Apache HTTP Server) HTTP Yes 7.5 Network Low None None Un-
changed
None High None 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-59375 Oracle HTTP Server Core (LibExpat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2024-43204 Oracle HTTP Server mod_proxy (Apache HTTP Server) HTTP Yes 7.5 Network Low None None Un-
changed
None High None 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-54571 Oracle HTTP Server mod_security (ModSecurity) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2024-47252 Oracle HTTP Server SSL module (Apache HTTP Server) HTTPS Yes 7.5 Network Low None None Un-
changed
High None None 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-41249 Oracle Identity Manager Installer (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 12.2.1.4.0, 14.1.2.1.0  
CVE-2025-41249 Oracle Middleware Common Libraries and Tools Third Party (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-59375 Oracle Outside In Technology Core (LibExpat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.5.7, 8.5.8  
CVE-2025-48976 Oracle Service Bus Core (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0  
CVE-2025-48976 Oracle SOA Suite Rest Converters (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-43967 Oracle WebCenter Enterprise Capture Client Bundle (libheif) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-41248 Oracle WebCenter Sites Core (Spring Security) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 14.1.2.0.0  
CVE-2025-48976 Oracle WebLogic Server Centralized Third Party Jars (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 12.2.1.4.0, 14.1.1.0.0  
CVE-2025-41249 Oracle WebLogic Server Core (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0  
CVE-2025-55163 Service Delivery Platform Messaging Enabler (Netty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 14.1.2.0.0  
CVE-2025-12383 Oracle Global Lifecycle Management NextGen OUI Framework NextGen Installer (Eclipse Jersey) TLS Yes 7.4 Network High None None Un-
changed
High High None 15.1.1.0.0, 15.1.1.0.0  
CVE-2025-12383 Oracle WebLogic Server Centralized Third Party Jars (Eclipse Jersey) HTTP Yes 7.4 Network High None None Un-
changed
High High None 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0  
CVE-2024-13009 Oracle Middleware Common Libraries and Tools Third Party (Eclipse Jetty) HTTP Yes 7.2 Network Low None None Changed Low Low None 14.1.2.0.0  
CVE-2024-13009 Oracle Unified Directory Core (Eclipse Jetty) HTTP Yes 7.2 Network Low None None Changed Low Low None 12.2.1.4.0, 14.1.2.1.0  
CVE-2025-26333 Oracle Fusion Middleware Oracle Database Client for Fusion Middleware (BSAFE Crypto-J) TLS Yes 5.9 Network High None None Un-
changed
High None None 14.1.2.0.0  
CVE-2025-26333 Oracle Security Service Third Party (BSAFE Crypto-J) TLS Yes 5.9 Network High None None Un-
changed
High None None 12.2.1.4.0  
CVE-2021-45105 Oracle WebCenter Sites Core (Apache Log4j) HTTP Yes 5.9 Network High None None Un-
changed
None None High 12.2.1.4.0  
CVE-2025-53864 Oracle WebLogic Server Centralized Third Party Jars (Nimbus JOSE+JWT) HTTP Yes 5.8 Network Low None None Changed None None Low 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0  
CVE-2025-48924 Oracle Access Manager Identity Store Access (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0, 14.1.2.1.0  
CVE-2025-48924 Oracle Business Process Management Suite Composer (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.2.0.0  
CVE-2025-31672 Oracle Fusion Middleware Oracle Database Client for Fusion Middleware (Apache POI) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 14.1.2.0.0  
CVE-2025-48924 Oracle Identity Manager Third Party (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0  
CVE-2025-48924 Oracle Identity Manager Connector Core (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0, 14.1.2.1.0  
CVE-2025-48924 Oracle Managed File Transfer Runtime Server (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-31672 Oracle Middleware Common Libraries and Tools Third Party (Apache POI) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 12.2.1.4.0, 14.1.2.0.0  
CVE-2025-48924 Oracle Service Bus Core (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.2.0.0  
CVE-2025-48924 Oracle SOA Suite Adapters (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.1.2.0.0  
CVE-2025-48924 Oracle WebCenter Sites Core (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 12.2.1.4.0, 14.1.2.0.0  
CVE-2024-47554 Oracle WebLogic Server Console (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 12.2.1.4.0, 14.1.1.0.0  

Notes:

  1. Affected version for Weblogic Server Proxy Plug-in for IIS is 12.2.1.4.0 only
  2. Applies to LINUX only
 

Additional CVEs addressed are:

  • The patch for CVE-2024-13009 also addresses CVE-2024-6763.
  • The patch for CVE-2025-54571 also addresses CVE-2025-47947, CVE-2025-48866, and CVE-2025-52891.
  • The patch for CVE-2025-66516 also addresses CVE-2025-54988.
  • The patch for CVE-2024-47252 also addresses CVE-2025-49812.
  • The patch for CVE-2025-43967 also addresses CVE-2025-43966.
  • The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
  • The patch for CVE-2022-41342 also addresses CVE-2022-40196.

 

Oracle Analytics Risk Matrix

This Critical Patch Update contains 8 new security patches, plus additional third party patches noted below, for Oracle Analytics.  6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2021-23926 Oracle Business Intelligence Enterprise Edition Core (Apache XMLBeans) HTTP Yes 9.1 Network Low None None Un-
changed
High None High 8.2.0.0.0  
CVE-2025-52999 Oracle Business Intelligence Enterprise Edition Analytics Server (jackson-core) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.6.0.0.0, 8.2.0.0.0  
CVE-2024-57699 Oracle Business Intelligence Enterprise Edition Analytics Server (json-smart) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0  
CVE-2025-9230 Oracle Business Intelligence Enterprise Edition Platform Security (OpenSSL) TLS Yes 7.5 Network Low None None Un-
changed
None None High 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0  
CVE-2022-45047 Oracle Business Intelligence Enterprise Edition Core (Apache Mina SSHD) SSH No 7.2 Network Low High None Un-
changed
High High High 8.2.0.0.0  
CVE-2026-21976 Oracle Business Intelligence Enterprise Edition Oracle Analytics Cloud None No 7.1 Local Low Low None Un-
changed
High High None 7.6.0.0.0, 8.2.0.0.0  
CVE-2025-48924 Oracle Business Intelligence Enterprise Edition Platform Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0  
CVE-2025-31672 Oracle Business Intelligence Enterprise Edition Analytics Server (Apache POI) Multiple Yes 5.3 Network Low None None Un-
changed
None None Low 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0  

Additional CVEs addressed are:

  • The patch for CVE-2025-9230 also addresses CVE-2025-9232.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle BI Publisher
    • Development Operations (Apache Tomcat): CVE-2025-41249 [VEX Justification: vulnerable_code_not_in_execute_path].
  • Oracle Business Intelligence Enterprise Edition
    • Platform Security (Bouncy Castle Java Library): CVE-2025-8885 and CVE-2024-30171 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].

 

Oracle Health Sciences Applications Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle Health Sciences Applications.  3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21980 Oracle Life Sciences Central Coding Platform HTTP Yes 6.5 Network Low None None Un-
changed
Low Low None 7.0.1.0  
CVE-2026-21970 Oracle Life Sciences Central Designer Platform HTTP No 6.5 Network Low Low None Un-
changed
High None None 7.0.1.0  
CVE-2026-21923 Oracle Life Sciences Central Designer Platform HTTP Yes 6.5 Network Low None None Un-
changed
Low Low None 7.0.1.0  
CVE-2023-29081 Oracle Life Sciences Central Coding Installation and Configuration (InstallShield) None No 5.5 Local Low Low None Un-
changed
None None High 7.0.1.0  
CVE-2026-21974 Oracle Life Sciences Central Designer Platform HTTP Yes 5.3 Network Low None None Un-
changed
Low None None 7.0.1.0  

 

Oracle HealthCare Applications Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle HealthCare Applications.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2024-52046 Oracle Health Sciences Information Manager XAD-PID Change Management XPID (Apache Mina) SSH Yes 9.8 Network Low None None Un-
changed
High High High 4.0.0  
CVE-2025-41249 Oracle Healthcare Master Person Index Master Index Data Manager (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 5.0.0.0-5.0.9.5  
CVE-2025-68161 Oracle Health Sciences Information Manager Health Record Locator (Apache Log4j) TLS Yes 5.4 Network High None None Changed Low Low None 4.0.0  
CVE-2025-68161 Oracle Healthcare Data Repository FHIR Server (Apache Log4j) TLS Yes 5.4 Network High None None Changed Low Low None 8.2.0.5, 8.2.0.6  
CVE-2025-68161 Oracle Healthcare Master Person Index Master Index Data Manager (Apache Log4j) TLS Yes 5.4 Network High None None Changed Low Low None 5.0.0.0-5.0.9.5  
CVE-2024-47554 Oracle Health Sciences Information Manager Install (Apache Commons IO) HTTP Yes 4.3 Network Low None Required Un-
changed
None None Low 4.0.0  

 

Oracle Hospitality Applications Risk Matrix

This Critical Patch Update contains 4 new security patches for Oracle Hospitality Applications.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21967 Oracle Hospitality OPERA 5 Property Services Opera Servlet HTTP Yes 8.6 Network Low None None Un-
changed
High Low Low 5.6.19, 5.6.25, 5.6.26, 5.6.27  
CVE-2025-48976 Oracle Hospitality OPERA 5 Property Services Opera (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 5.6.19, 5.6.25, 5.6.26, 5.6.27  
CVE-2026-21966 Oracle Hospitality OPERA 5 Property Services Opera HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.6.19, 5.6.25, 5.6.26, 5.6.27  
CVE-2025-48924 Oracle Hospitality OPERA 5 Property Services Opera (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 5.6.19, 5.6.25, 5.6.26, 5.6.27  

 

Oracle Hyperion Risk Matrix

This Critical Patch Update contains 12 new security patches for Oracle Hyperion.  10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-49796 Oracle Hyperion Infrastructure Technology Install and Configuration (libxml2) HTTP Yes 9.1 Network Low None None Un-
changed
None High High 11.2.23  
CVE-2025-27363 Oracle Hyperion Financial Reporting Install (FreeType) HTTP Yes 8.1 Network High None None Un-
changed
High High High 11.2.23  
CVE-2025-43967 Oracle Hyperion Financial Reporting Install (libheif) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 11.2.23  
CVE-2025-48924 Oracle Hyperion Calculation Manager Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2025-48924 Oracle Hyperion Financial Close Management Close Manager (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2025-48924 Oracle Hyperion Financial Management Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2025-48924 Oracle Hyperion Financial Reporting Server Components (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2025-48924 Oracle Hyperion Infrastructure Technology Install and Configuration (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2025-48924 Oracle Hyperion Planning Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2025-48924 Oracle Hyperion Profitability and Cost Management Install (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 11.2.23  
CVE-2026-21922 Oracle Planning and Budgeting Cloud Service EPM Agent None No 4.2 Local Low High Required Un-
changed
None High None 25.04.07 See Note 1
CVE-2026-21979 Oracle Planning and Budgeting Cloud Service EPM Agent None No 4.2 Local Low High Required Un-
changed
High None None 25.04.07 See Note 1

Notes:

  1. Update EPM Agent. Please refer to Downloading the EPM Agent for more information.
 

Additional CVEs addressed are:

  • The patch for CVE-2025-43967 also addresses CVE-2025-43966.
  • The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.

 

Oracle Java SE Risk Matrix

This Critical Patch Update contains 11 new security patches for Oracle Java SE.  All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Low" instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.

Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-43368 Oracle Java SE JavaFX (WebKitGTK) Multiple Yes 7.5 Network High None Required Un-
changed
High High High Oracle Java SE: 8u471-b50 See Note 1
CVE-2025-7425 Oracle Java SE JavaFX (libxslt) Multiple Yes 7.5 Network High None Required Un-
changed
High High High Oracle Java SE: 8u471-b50 See Note 1
CVE-2026-21945 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition Security Multiple Yes 7.5 Network Low None None Un-
changed
None None High Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16 See Note 1
CVE-2026-21932 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition AWT, JavaFX Multiple Yes 7.4 Network Low None Required Changed None High None Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16 See Note 1
CVE-2026-21933 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition Networking Multiple Yes 6.1 Network Low None Required Changed Low Low None Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16 See Note 2
CVE-2025-6021 Oracle Java SE JavaFX (libxml2) Multiple Yes 5.9 Network High None None Un-
changed
None None High Oracle Java SE: 8u471-b50 See Note 1
CVE-2025-12183 Oracle JDK Mission Control Mission Control (lz4-java) Multiple Yes 5.4 Network Low None Required Un-
changed
Low None Low Oracle JDK Mission Control: 9.1.1  
CVE-2026-21925 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition RMI Multiple Yes 4.8 Network High None None Un-
changed
Low Low None Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16 See Note 2
CVE-2025-6052 Oracle Java SE JavaFX (glibc) Multiple Yes 3.7 Network High None None Un-
changed
None None Low Oracle Java SE: 8u471-b50 See Note 1
CVE-2026-21947 Oracle Java SE JavaFX Multiple Yes 3.1 Network High None Required Un-
changed
None Low None Oracle Java SE: 8u471-b50 See Note 1
CVE-2025-47219 Oracle Java SE JavaFX (gstreamer) Multiple Yes 3.1 Network High None Required Un-
changed
Low None None Oracle Java SE: 8u471-b50 See Note 2

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
  2. This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
 

Additional CVEs addressed are:

  • The patch for CVE-2025-43368 also addresses CVE-2025-43272, CVE-2025-43342, and CVE-2025-43356.
  • The patch for CVE-2025-47219 also addresses CVE-2025-47183.
  • The patch for CVE-2025-7425 also addresses CVE-2025-10911 and CVE-2025-7424.
  • The patch for CVE-2025-6021 also addresses CVE-2025-8732.

 

Oracle JD Edwards Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle JD Edwards.  5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-27363 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech - Cloud (FreeType) Oracle Net Yes 8.1 Network High None None Un-
changed
High High High 9.2.0.0-9.2.9.4  
CVE-2023-1393 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech - Cloud (X.Org Server) None No 7.8 Local Low Low None Un-
changed
High High High 9.2.0.0-9.2.9.4  
CVE-2025-27210 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech - Cloud (Node.js) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 9.2.0.0-9.2.9.4  
CVE-2023-42670 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech - Cloud (Samba) SMB No 6.5 Network Low Low None Un-
changed
None None High 9.2.0.0-9.2.9.4  
CVE-2026-21946 JD Edwards EnterpriseOne Tools Web Runtime SEC HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2.0.0-9.2.26.0  
CVE-2025-26333 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech - Cloud (BSAFE Crypto-J) Oracle Net Yes 5.9 Network High None None Un-
changed
High None None 9.2.0.0-9.2.9.4  
CVE-2024-43796 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech - Cloud (Express.js) HTTP Yes 4.7 Network High None Required Changed Low Low None 9.2.0.0-9.2.9.4  

Additional CVEs addressed are:

  • The patch for CVE-2023-42670 also addresses CVE-2023-4091, CVE-2023-4154, and CVE-2023-42669.
  • The patch for CVE-2025-27210 also addresses CVE-2025-27209.

 

Oracle MySQL Risk Matrix

This Critical Patch Update contains 20 new security patches for Oracle MySQL.  7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-6965 MySQL Server Server: Docker Images (SQLite) MySQL Protocol Yes 9.8 Network Low None None Un-
changed
High High High 8.4.0-8.4.7 See Note 1
CVE-2025-9230 MySQL Connectors Connector/C++ (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0-9.5.0  
CVE-2025-9230 MySQL Connectors Connector/ODBC (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-
changed
None None High 9.0.0-9.5.0  
CVE-2025-9086 MySQL Enterprise Backup Enterprise Backup (curl) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0  
CVE-2025-9230 MySQL Enterprise Backup Enterprise Backup (OpenSSL) TLS Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2025-9230 MySQL Server Server: Packaging (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2025-9230 MySQL Workbench MySQL Workbench (OpenSSL) MySQL Workbench Yes 7.5 Network Low None None Un-
changed
None None High 8.0.0-8.0.45  
CVE-2025-65018 MySQL Workbench MySQL Workbench (libpng) MySQL Workbench No 7.1 Local Low None Required Un-
changed
None High High 8.0.0-8.0.45  
CVE-2026-21949 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-
changed
None None High 9.0.0-9.5.0  
CVE-2026-21950 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-
changed
None None High 9.0.0-9.5.0  
CVE-2026-21968 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21929 MySQL Server Server: Parser MySQL Protocol No 5.3 Network High Low None Un-
changed
None None High 9.0.0-9.5.0  
CVE-2026-21936 MySQL Cluster Cluster: General MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 7.6.0-7.6.36, 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21936 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21937 MySQL Server Server: DDL MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21941 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21948 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21952 MySQL Server Server: Parser MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 9.0.0-9.5.0  
CVE-2026-21964 MySQL Server Server: Thread Pooling MySQL Protocol No 4.9 Network Low High None Un-
changed
None None High 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0  
CVE-2026-21965 MySQL Server Server: Pluggable Auth MySQL Protocol No 2.7 Network Low High None Un-
changed
None None Low 9.0.0-9.5.0  

Notes:

  1. This vulnerability applies to MySQL server docker images and SQLite isn't directly used by MySQL server.
 

Additional CVEs addressed are:

  • The patch for CVE-2025-9230 also addresses CVE-2025-9232.
  • The patch for CVE-2025-9086 also addresses CVE-2025-10148.
  • The patch for CVE-2025-65018 also addresses CVE-2025-64505, CVE-2025-64506, and CVE-2025-64720.

 

Oracle PeopleSoft Risk Matrix

This Critical Patch Update contains 12 new security patches for Oracle PeopleSoft.  10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-66516 PeopleSoft Enterprise PeopleTools OpenSearch (Apache Tika) HTTP Yes 10.0 Network Low None None Changed High High High 8.60, 8.61, 8.62  
CVE-2025-6965 PeopleSoft Enterprise PeopleTools Porting (SQLite) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 8.60, 8.61, 8.62  
CVE-2025-9086 PeopleSoft Enterprise PeopleTools File Processing (curl) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 8.60, 8.61, 8.62  
CVE-2025-27210 PeopleSoft Enterprise PeopleTools OpenSearch Dashboards (Node.js) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 8.60, 8.61, 8.62  
CVE-2025-9230 PeopleSoft Enterprise PeopleTools Security (OpenSSL) HTTPS Yes 7.5 Network Low None None Un-
changed
None None High 8.60, 8.61, 8.62  
CVE-2026-21961 PeopleSoft Enterprise HCM Human Resources Company Dir / Org Chart Viewer, Employee Snapshot HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2  
CVE-2026-21951 PeopleSoft Enterprise PeopleTools Integration Broker HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.60, 8.61, 8.62  
CVE-2026-21938 PeopleSoft Enterprise PeopleTools Portal HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.60, 8.61, 8.62  
CVE-2026-21934 PeopleSoft Enterprise PeopleTools Push Notifications HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 8.60, 8.61, 8.62  
CVE-2026-21971 PeopleSoft Enterprise SCM Purchasing Purchasing HTTP No 5.4 Network Low Low None Un-
changed
Low Low None 9.2  
CVE-2025-48924 PeopleSoft Enterprise PeopleTools OpenSearch (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 8.60, 8.61, 8.62  
CVE-2025-55163 PeopleSoft Enterprise PeopleTools OpenSearch (Netty) HTTP/2 Yes 5.3 Network Low None None Un-
changed
None None Low 8.60, 8.61, 8.62  

Additional CVEs addressed are:

  • The patch for CVE-2025-9086 also addresses CVE-2025-10148.
  • The patch for CVE-2025-66516 also addresses CVE-2025-54988.
  • The patch for CVE-2025-27210 also addresses CVE-2025-23084 and CVE-2025-27209.
  • The patch for CVE-2025-9230 also addresses CVE-2025-9231 and CVE-2025-9232.

 

Oracle Retail Applications Risk Matrix

This Critical Patch Update contains 14 new security patches for Oracle Retail Applications.  10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-48734 Oracle Retail Advanced Inventory Planning Operations and Maintenance (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 15.0.3, 16.0.3  
CVE-2025-48734 Oracle Retail Allocation Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 15.0.3, 16.0.3  
CVE-2025-48734 Oracle Retail Fiscal Management NF Issuing (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 14.2  
CVE-2025-41249 Oracle Retail Bulk Data Integration BDI Job Scheduler (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 16.0.3, 19.0.1  
CVE-2025-41249 Oracle Retail Financial Integration PeopleSoft Integration (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 16.0.3, 19.0.1  
CVE-2025-41249 Oracle Retail Integration Bus RIB Kernal (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 16.0.3, 19.0.1  
CVE-2025-41249 Oracle Retail Predictive Application Server RPAS Client (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 15.0.3, 16.0.3  
CVE-2025-41249 Oracle Retail Service Backbone RSB Installation (Spring Framework) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 16.0.3, 19.0.1  
CVE-2025-7962 Oracle Retail Xstore Office Security (Jakarta Mail) HTTP Yes 7.5 Network Low None None Un-
changed
None High None 25.0.1  
CVE-2025-26333 Oracle Retail Integration Bus RIB Kernal (BSAFE Crypto-J) HTTP Yes 5.9 Network High None None Un-
changed
High None None 16.0.3, 19.0.1  
CVE-2025-26333 Oracle Retail Predictive Application Server RPAS Server (BSAFE Crypto-J) HTTP Yes 5.9 Network High None None Un-
changed
High None None 15.0.3  
CVE-2025-26333 Oracle Retail Service Backbone RSB Installation (BSAFE Crypto-J) HTTP Yes 5.9 Network High None None Un-
changed
High None None 16.0.3, 19.0.1  
CVE-2025-48924 Oracle Retail Fiscal Management NF Issuing (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 14.2  
CVE-2025-61795 Oracle Retail Xstore Point of Service Xenvironment (Apache Tomcat) HTTP No 5.3 Network High Low None Un-
changed
None None High 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0  

 

Oracle Siebel CRM Risk Matrix

This Critical Patch Update contains 14 new security patches for Oracle Siebel CRM.  11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-6965 Siebel CRM Cloud Applications Siebel Cloud Manager (OpenSearch Dashboards) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 17.0-25.11  
CVE-2025-53547 Siebel CRM Cloud Applications Siebel Cloud Manager (Helm) None No 8.6 Local Low None Required Changed High High High 17.0-25.9  
CVE-2025-48976 Siebel Apps - Marketing Email Marketing (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 17.0-25.9  
CVE-2025-53643 Siebel CRM Cloud Applications Siebel Cloud Manager (AIOHTTP) HTTP Yes 7.5 Network Low None None Un-
changed
None High None 17.0-25.9  
CVE-2025-27817 Siebel CRM Deployment Application Interface (Apache Log4j) HTTP Yes 7.5 Network Low None None Un-
changed
High None None 17.0-25.10  
CVE-2025-48989 Siebel CRM Deployment Application Interface (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 17.0-25.10  
CVE-2021-33813 Siebel CRM Deployment Application Interface (JDOM) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 17.0-25.11  
CVE-2026-21926 Siebel CRM Deployment Server Infrastructure TLS Yes 7.5 Network Low None None Un-
changed
None None High 17.0-25.2  
CVE-2024-23807 Siebel CRM Integration EAI (Apache Xerces-C++) HTTP No 7.2 Network Low High None Un-
changed
High High High 17.0-25.9  
CVE-2025-4575 Siebel CRM Deployment Server Infrastructure (OpenSSL) HTTPS Yes 6.5 Network Low None None Un-
changed
None Low Low 17.0-25.11  
CVE-2022-23395 Siebel CRM Deployment Application Interface (jquery-cookie) HTTP Yes 6.1 Network Low None Required Changed Low Low None 17.0-25.9  
CVE-2025-8916 Siebel CRM Deployment Server Infrastructure (Bouncy Castle Java Library) HTTPS Yes 5.3 Network Low None None Un-
changed
None None Low 17.0-25.9  
CVE-2025-48924 Siebel CRM Integration REST (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 17.0-25.9  
CVE-2025-5372 Siebel CRM Cloud Applications Containers and Related Services (libssh) HTTP No 5.0 Network High Low None Un-
changed
Low Low Low 17.0-25.9  

Additional CVEs addressed are:

  • The patch for CVE-2025-27817 also addresses CVE-2024-31141.
  • The patch for CVE-2021-33813 also addresses CVE-2018-1000632 and CVE-2020-10683.

 

Oracle Supply Chain Risk Matrix

This Critical Patch Update contains 10 new security patches for Oracle Supply Chain.  8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21969 Oracle Agile Product Lifecycle Management for Process Supplier Portal HTTP Yes 9.8 Network Low None None Un-
changed
High High High 6.2.4  
CVE-2025-54874 Oracle AutoVue Office Security (OpenJPEG) HTTP Yes 9.8 Network Low None None Un-
changed
High High High 21.1.0 See Note 1
CVE-2025-48734 Oracle Agile PLM Security (Apache Commons BeanUtils) HTTP No 8.8 Network Low Low None Un-
changed
High High High 9.3.6  
CVE-2025-48976 Oracle Agile PLM Folders, Files and Attachments (Apache Commons FileUpload) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.3.6  
CVE-2025-48989 Oracle Agile PLM Security (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 9.3.6  
CVE-2026-21940 Oracle Agile PLM User and User Group HTTP Yes 7.5 Network Low None None Un-
changed
High None None 9.3.6  
CVE-2025-5115 Oracle Autovue for Agile Product Lifecycle Management Internal Operations (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 21.1.0  
CVE-2025-5115 Oracle AutoVue Office Security (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 21.1.0 See Note 2
CVE-2026-21944 Oracle Agile Product Lifecycle Management for Process Product Quality Management HTTP No 6.5 Network Low Low None Un-
changed
High None None 6.2.4  
CVE-2025-31672 Oracle Agile PLM Document Management (Apache POI) HTTP Yes 5.3 Network Low None None Un-
changed
None Low None 9.3.6  

Notes:

  1. This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
  2. This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.


 

Oracle Systems Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle Systems.  1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21927 Oracle Solaris Driver None No 5.8 Local Low High Required Un-
changed
High High None 11  
CVE-2026-21935 Oracle Solaris Driver None No 5.8 Local Low High Required Un-
changed
High High None 11  
CVE-2026-21928 Oracle Solaris Kernel TCP Yes 5.3 Network Low None None Un-
changed
Low None None 11  
CVE-2026-21942 Oracle Solaris Filesystems None No 5.0 Local Low Low Required Un-
changed
None None High 10, 11  
CVE-2026-21930 Oracle ZFS Storage Appliance Kit Filesystems None No 2.3 Local Low High None Un-
changed
None Low None 8.8  

 

Oracle Utilities Applications Risk Matrix

This Critical Patch Update contains 5 new security patches, plus additional third party patches noted below, for Oracle Utilities Applications.  4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2025-55163 Oracle Utilities Network Management System Core (Netty) HTTP/2 Yes 7.5 Network Low None None Un-
changed
None None High 2.5.0.2.10, 2.6.0.1.9, 2.6.0.2.5  
CVE-2025-48989 Oracle Utilities Testing Accelerator Core (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-
changed
None None High 7.0.0.0.6, 7.0.0.1.4, 25.4.0.0.1  
CVE-2026-21924 Oracle Utilities Application Framework General HTTP No 5.4 Network Low Low Required Changed Low Low None 4.4.0.3.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10  
CVE-2025-48924 Oracle Utilities Application Framework Security (Apache Commons Lang) HTTP Yes 5.3 Network Low None None Un-
changed
None None Low 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10  
CVE-2025-8916 Oracle Utilities Application Framework Security (Bouncy Castle Java Library) HTTPS Yes 5.3 Network Low None None Un-
changed
None None Low 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10  

Additional CVEs addressed are:

  • The patch for CVE-2025-48989 also addresses CVE-2025-52520.

Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:

  • Oracle Utilities Network Management System
    • Core (Apache ZooKeeper): CVE-2024-51504 [VEX Justification: vulnerable_code_not_in_execute_path].

 

Oracle Virtualization Risk Matrix

This Critical Patch Update contains 14 new security patches for Oracle Virtualization.  1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.  The English text form of this Risk Matrix can be found here.

CVE ID Product Component Protocol Remote
Exploit
without
Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req'd
User
Interact
Scope Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2026-21955 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21956 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21987 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21988 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21990 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21989 Oracle VM VirtualBox Core None No 8.1 Local Low High None Changed High High Low 7.1.14, 7.2.4  
CVE-2026-21957 Oracle VM VirtualBox Core None No 7.5 Local High High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21983 Oracle VM VirtualBox Core None No 7.5 Local High High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21984 Oracle VM VirtualBox Core None No 7.5 Local High High None Changed High High High 7.1.14, 7.2.4  
CVE-2026-21982 Oracle VM VirtualBox Core TCP Yes 7.5 Adjacent
Network
High None None Un-
changed
High High High 7.1.14, 7.2.4  
CVE-2026-21986 Oracle VM VirtualBox Core None No 7.1 Local Low None None Changed None None High 7.1.14, 7.2.4 See Note 1
CVE-2026-21963 Oracle VM VirtualBox Core None No 6.0 Local Low High None Changed High None None 7.1.14, 7.2.4  
CVE-2026-21985 Oracle VM VirtualBox Core None No 6.0 Local Low High None Changed High None None 7.1.14, 7.2.4  
CVE-2026-21981 Oracle VM VirtualBox Core None No 4.6 Local Low High None Changed Low None Low 7.1.14, 7.2.4  

Notes:

  1. This vulnerability applies to Windows VMs only.