{"id":223763,"date":"2025-10-22T05:18:19","date_gmt":"2025-10-22T10:18:19","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/10\/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw"},"modified":"2025-10-22T05:18:19","modified_gmt":"2025-10-22T10:18:19","slug":"cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/10\/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw","title":{"rendered":"CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw.jpg\"><\/a><\/p>\n<p>CISA has confirmed that an Oracle E-Business Suite flaw tracked as CVE-2025\u201361884 is being exploited in attacks, adding it to its Known Exploited Vulnerabilities catalog.<\/p>\n<p>BleepingComputer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/oracle-silently-fixes-zero-day-exploit-leaked-by-shinyhunters\/\" target=\"_blank\" rel=\"nofollow noopener\">previously reported<\/a> that CVE-2025\u201361884 is an unauthenticated server-side request forgery (SSRF) vulnerability in the Oracle Configurator runtime component, which was linked to a leaked exploit used in July attacks.<\/p>\n<p>The US cybersecurity agency is now requiring federal agencies to patch the security vulnerability by November 10, 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISA has confirmed that an Oracle E-Business Suite flaw tracked as CVE-2025\u201361884 is being exploited in attacks, adding it to its Known Exploited Vulnerabilities catalog. BleepingComputer previously reported that CVE-2025\u201361884 is an unauthenticated server-side request forgery (SSRF) vulnerability in the Oracle Configurator runtime component, which was linked to a leaked exploit used in July attacks. [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,34],"tags":[],"class_list":["post-223763","post","type-post","status-publish","format-standard","hentry","category-business","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/223763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=223763"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/223763\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=223763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=223763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=223763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}