
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in Oracle Workflow, a component of Oracle E-Business Suite (CVE-2025-53052). The vulnerability affects Oracle Workflow versions 12.2.3 through 12.2.14, specifically in the Workflow Notification Mailer component. This security flaw was discovered and reported by Kush Jijania and was publicly disclosed in October 2025 (Oracle Advisory).
The vulnerability is characterized as easily exploitable and allows unauthenticated attackers with network access via HTTP to compromise Oracle Workflow. The vulnerability has received a CVSS 3.1 Base Score of 6.1 (Medium severity), with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The scoring indicates that the vulnerability requires low attack complexity and no privileges, but does require user interaction (NVD).
Successful exploitation of this vulnerability can result in unauthorized update, insert or delete access to some Oracle Workflow accessible data, as well as unauthorized read access to a subset of Oracle Workflow accessible data. While the vulnerability exists in Oracle Workflow, attacks may significantly impact additional products due to scope change (NVD).
Oracle has released security patches to address this vulnerability as part of their October 2025 Critical Patch Update. Users are strongly advised to update to the latest patched versions of the affected software. The patches are cumulative and address multiple security vulnerabilities in Oracle products (Oracle Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."