
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-21535 is a critical vulnerability in Oracle WebLogic Server affecting versions 12.2.1.4.0 and 14.1.1.0.0. The vulnerability was disclosed on January 21, 2025, as part of Oracle's January 2025 Critical Patch Update. This easily exploitable vulnerability allows unauthenticated attackers with network access via T3 or IIOP protocols to compromise Oracle WebLogic Server (NVD Database, Oracle CPU).
The vulnerability has received a Critical CVSS 3.1 Base Score of 9.8 (Confidentiality, Integrity, and Availability impacts), with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The flaw arises from WebLogic's insufficient filtering of incoming data through the T3 and IIOP protocols. The vulnerability is particularly concerning due to WebLogic's role as a Java EE application server, known for its scalability and enterprise services (Security Online).
Successful exploitation of this vulnerability can result in complete takeover of Oracle WebLogic Server. The high CVSS score reflects the severe potential impact on confidentiality, integrity, and availability of the affected systems. The vulnerability is particularly critical as it affects core components of WebLogic Server and requires no authentication for exploitation (NVD Database).
Oracle has released patches for affected versions through their support portal. For organizations unable to immediately apply patches, temporary mitigation measures include: restricting T3 Protocol Access using WebLogic's default connection filter (weblogic.security.net.ConnectionFilterImpl) and disabling the IIOP protocol through the WebLogic console. The IIOP protocol can be disabled by navigating to Service > AdminServer > Protocol and unselecting Enable IIOP, followed by a server restart (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”