CrowdSec
9/10CrowdSec Score

Oracle Identity Manager - Authentication Bypass (CVE-2025-61757)

Published on21-10-2025
First seen on15-12-2025
Public ExploitCVSS 9.8/10Oracle Corporation - Identity Manager

5Exploiting IPs reported

Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CrowdSec analysis

CVE-2025-61757 is a critical vulnerability in Oracle Fusion Middleware's Identity Manager REST WebServices component, affecting versions 12.2.1.4.0 and 14.1.2.1.0. This flaw allows unauthenticated attackers with network access via HTTP to easily compromise the Identity Manager, potentially resulting in a complete system takeover. Exploitation could lead to severe impacts on confidentiality, integrity, and availability, making it a prime target for remote attacks.

CrowdSec has been tracking this vulnerability and its exploits since 10th of December 2025.

Data from the CrowdSec community indicates that exploitation of CVE-2025-61757 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-61757 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Attackers exploit this vulnerability by sending unauthenticated requests to endpoints such as /iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus and /iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus;.wadl, bypassing authentication to gain unauthorized access and potentially take over Oracle Identity Manager.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.