Google Confirms Active Exploitation of Two Oracle Vulnerabilities
On October 16, 2025, Google's Threat Intelligence Group confirmed that CVE-2025-61884 and CVE-2025-61882 were exploited in the wild as zero-days. CVE-2025-61884 is a vulnerability in the Runtime user interface in the Oracle Configurator product of Oracle E-Business Suite (EBS), representing an "easily exploitable vulnerability [that] allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator".
π¨ Critical Vulnerability Details:
CVE-2025-61884
Product: Oracle Configurator (Oracle E-Business Suite)
Attack Vector: Network access via HTTP, no authentication required
Impact: Allows unauthenticated attackers to compromise Oracle Configurator
Exploitation Status: Confirmed exploited in the wild by Google TAG
CVE-2025-61882
Product: Oracle E-Business Suite
Exploitation Status: Confirmed exploited in the wild by Google TAG
Related Campaign: Associated with CVE-2025-61884 exploitation
β οΈ IMMEDIATE ACTION REQUIRED: Organizations running Oracle E-Business Suite should immediately apply available patches and review access logs for signs of compromise. The ease of exploitation and lack of authentication requirements make these vulnerabilities particularly dangerous for internet-facing EBS deployments.
This marks another significant supply chain security concern as Oracle E-Business Suite is widely deployed in enterprise environments for financial management, supply chain operations, and customer relationship management. The confirmation of active exploitation highlights the critical need for prompt patching of enterprise software vulnerabilities.