Skip to main content

Oracle Releases Security Advisory to Address a Critical Vulnerability in Oracle Fusion Middleware

Successful exploitation could allow an unauthenticated attacker with HTTP network access to create, delete, or modify critical data accessible through the Oracle HTTP Server and Oracle WebLogic Server Proxy Plug‑in

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Successful exploitation could allow an unauthenticated attacker with HTTP network access to create, delete, or modify critical data accessible through the Oracle HTTP Server and Oracle WebLogic Server Proxy Plug‑in


Threat details

Proof-of-Concept Exploit for CVE-2026-21962

proof-of-concept exploit for CVE-2026-21962 is publicly available. The NHS England National CSOC assesses exploitation as highly likely.


Introduction

Oracle has published a security advisory addressing a critical a vulnerability in Oracle HTTP Server and Oracle Weblogic Server Proxy Plug-in within Oracle Fusion Middleware. Successful exploitation of CVE-2026-21962 could allow an unauthenticated attacker with HTTP network access to create, delete, or modify critical data accessible through the Oracle HTTP Server and Oracle WebLogic Server Proxy Plug‑in.

  • CVE-2026-21962  - an ' Improper Access Control' vulnerability with CVSSv3 score: 10. 

Both Weblogic Server Proxy Plug-in for Apache HTTP Server and Weblogic Server Proxy Plug-in for IIS components are affected by the vulnerability.


Remediation advice

Affected organisations are strongly advised to review Oracle's Critical Patch Update Advisory and apply the relevant updates as soon as possible.



Last edited: 22 January 2026 4:26 pm