Oracle Releases Security Advisory to Address a Critical Vulnerability in Oracle Fusion Middleware
Successful exploitation could allow an unauthenticated attacker with HTTP network access to create, delete, or modify critical data accessible through the Oracle HTTP Server and Oracle WebLogic Server Proxy Plug‑in
Summary
Successful exploitation could allow an unauthenticated attacker with HTTP network access to create, delete, or modify critical data accessible through the Oracle HTTP Server and Oracle WebLogic Server Proxy Plug‑in
Affected platforms
The following platforms are known to be affected:
Threat details
Proof-of-Concept Exploit for CVE-2026-21962
A proof-of-concept exploit for CVE-2026-21962 is publicly available. The NHS England National CSOC assesses exploitation as highly likely.
Introduction
Oracle has published a security advisory addressing a critical a vulnerability in Oracle HTTP Server and Oracle Weblogic Server Proxy Plug-in within Oracle Fusion Middleware. Successful exploitation of CVE-2026-21962 could allow an unauthenticated attacker with HTTP network access to create, delete, or modify critical data accessible through the Oracle HTTP Server and Oracle WebLogic Server Proxy Plug‑in.
- CVE-2026-21962 - an ' Improper Access Control' vulnerability with CVSSv3 score: 10.
Both Weblogic Server Proxy Plug-in for Apache HTTP Server and Weblogic Server Proxy Plug-in for IIS components are affected by the vulnerability.
Remediation advice
Affected organisations are strongly advised to review Oracle's Critical Patch Update Advisory and apply the relevant updates as soon as possible.
Definitive source of threat updates
Last edited: 22 January 2026 4:26 pm