Oracle Identity Manager - Authentication Bypass (CVE-2025-61757)
5Exploiting IPs reported
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CrowdSec analysis
CVE-2025-61757 is a critical vulnerability in Oracle Fusion Middleware's Identity Manager REST WebServices component, affecting versions 12.2.1.4.0 and 14.1.2.1.0. This flaw allows unauthenticated attackers with network access via HTTP to easily compromise the Identity Manager, potentially resulting in a complete system takeover. Exploitation could lead to severe impacts on confidentiality, integrity, and availability, making it a prime target for remote attacks.
CrowdSec has been tracking this vulnerability and its exploits since 10th of December 2025.
Data from the CrowdSec community indicates that exploitation of CVE-2025-61757 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-61757 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.
Attackers exploit this vulnerability by sending unauthenticated requests to endpoints such as /iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus and /iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus;.wadl, bypassing authentication to gain unauthorized access and potentially take over Oracle Identity Manager.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.