The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding CVE-2025-61757, a remote code execution (RCE) vulnerability in Oracle Fusion Middleware Identity Manager. The flaw, rated 9.8 out of 10.0 on the CVSS scale, is being actively exploited in the wild, leading to its addition to CISA's Known Exploited Vulnerabilities (KEV) catalog. The vulnerability allows a remote, unauthenticated attacker to completely compromise affected systems. It impacts Oracle Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0. Due to the confirmed exploitation and severe risk, CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies must apply Oracle's patch, released in October 2025, by December 12, 2025. All organizations using the affected software are urged to patch immediately.
The vulnerability, CVE-2025-61757, is a combination of two distinct issues that can be chained together to achieve pre-authentication RCE.
Authentication Bypass: The root cause is a "missing authentication for critical function" flaw. Researchers at Searchlight Cyber discovered that a security filter in Oracle Identity Manager could be tricked into treating protected REST API endpoints as public. An attacker can achieve this simply by appending a specific parameter, such as ?WSDL or ;.wadl, to the URL path of a protected resource. This bypasses the authentication check entirely.
Code Injection: Once authentication is bypassed, the attacker can send a request to a normally protected Groovy script endpoint. This endpoint was intended for benign purposes like syntax checking. However, it is vulnerable to code injection through Groovy's annotation-processing features. An attacker can craft a malicious script that is executed at compile time on the server, leading to arbitrary code execution.
The combination of these two flaws makes the exploit "somewhat trivial," according to researchers, as it does not require any credentials or user interaction.
CISA has confirmed active exploitation of CVE-2025-61757. This is corroborated by researchers at the SANS Technology Institute, who observed multiple HTTP POST requests targeting the vulnerable endpoint between August 30 and September 9, 2025. These attempts occurred weeks before Oracle released a patch on October 21, 2025, indicating the vulnerability was exploited as a zero-day. The scans originated from multiple IP addresses but shared a common user agent, suggesting a single threat actor was likely behind the initial exploitation campaign. The addition of the flaw to the KEV catalog underscores the immediate and ongoing threat.
12.2.1.4.014.1.2.1.0Organizations using these specific versions are highly vulnerable and should prioritize remediation.
A successful exploit of CVE-2025-61757 grants an attacker complete control over the underlying Oracle Identity Manager server. As an identity and access management (IAM) solution, this system is a high-value target. A compromise could lead to:
For government agencies and large enterprises that rely on this product, a compromise could be catastrophic, enabling widespread unauthorized access across the organization's entire IT landscape.
| Type | Value | Description |
|---|---|---|
| ip_address_v4 | 89.238.132.76 |
Source IP observed in scanning activity. |
| ip_address_v4 | 185.245.82.81 |
Source IP observed in scanning activity. |
| ip_address_v4 | 138.199.29.153 |
Source IP observed in scanning activity. |
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| url_pattern | *?WSDL |
Exploitation attempts may include this string appended to a URL path to bypass authentication. | WAF, Reverse Proxy Logs, Web Server Logs | high |
| url_pattern | *;.wadl |
An alternative string used in exploitation attempts to bypass authentication. | WAF, Reverse Proxy Logs, Web Server Logs | high |
| url_pattern | */iam/admin/v1/GroovyScript |
The likely path to the vulnerable Groovy script endpoint. Monitor for POST requests to this path from unauthenticated sources. | WAF, Web Server Logs | high |
| process_name | java.exe |
Suspicious child processes spawning from the main Oracle WebLogic Java process (e.g., cmd.exe, powershell.exe, /bin/sh). |
EDR, Host-based monitoring | high |
Security teams should focus on both network and host-based detection.
Web Log Analysis: Ingest web server, reverse proxy, and WAF logs into a SIEM. Create detection rules to alert on requests to Oracle Identity Manager paths that contain the ?WSDL or ;.wadl strings, especially if followed by a POST request to a script endpoint. This is a direct application of D3-NTA: Network Traffic Analysis.
EDR Monitoring: On the Oracle server, monitor the Java process associated with WebLogic Server for any suspicious child process creation. The application should not be spawning shells or command-line interpreters. This falls under D3-PA: Process Analysis.
Vulnerability Scanning: Use authenticated vulnerability scanners to check for the presence of vulnerable Oracle Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0.
The primary remediation is to apply the security updates released by Oracle in its October 2025 Critical Patch Update (CPU).
Patch Immediately: Prioritize the deployment of the patch for CVE-2025-61757 on all internet-facing and internal Oracle Identity Manager instances. This is a form of D3-SU: Software Update.
Workaround (Temporary): If patching is not immediately possible, implement strict access control rules on a WAF or reverse proxy to block any requests containing the patterns ?WSDL or ;.wadl directed at the Oracle Identity Manager application. This is a compensating control but should not replace patching. This is a form of D3-ITF: Inbound Traffic Filtering.
Assume Compromise: Given the evidence of zero-day exploitation, organizations with vulnerable, internet-exposed systems should assume compromise and initiate threat hunting activities to look for signs of persistence or lateral movement.
The most effective mitigation is to apply the security patches provided by Oracle immediately.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to filter for malicious URL patterns as a temporary workaround.
Mapped D3FEND Techniques:
The primary and most critical countermeasure against CVE-2025-61757 is the immediate application of the patch provided in Oracle's October 2025 Critical Patch Update. Given that this vulnerability is being actively exploited as a zero-day and is now part of the CISA KEV catalog, patching cannot be delayed. Organizations must activate their emergency patching procedures. Priority should be given to any internet-facing Oracle Identity Manager instances, as they are the most exposed. Following that, all internal instances must be patched to prevent lateral movement. Patching should be managed through a centralized patch management system to ensure complete coverage and verification. After deployment, run a vulnerability scan to confirm that the patch has been applied successfully and the vulnerability is no longer detected. Deferring this action poses an unacceptable risk of complete system compromise.
As a compensating control or a defense-in-depth measure, organizations should implement stringent inbound traffic filtering using a Web Application Firewall (WAF) positioned in front of their Oracle Identity Manager servers. A specific rule should be created to detect and block any HTTP requests to the application that contain the strings ?WSDL or ;.wadl in the URI. This virtual patch directly targets the authentication bypass vector of the exploit chain. While effective against the known public exploit method, attackers may discover alternative bypass strings, so this should not be considered a permanent fix. This WAF rule can serve as an immediate, temporary mitigation while the official Oracle patch is being tested and deployed, and it should be kept active even after patching to provide an additional layer of security against similar logic flaws in the future.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats