Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-61757

Oracle Identity Manager REST API Authentication Bypass Enables Remote Code Execution: CVE‑2025‑61757

Vulnerability Overview 

CVE ID: CVE-2025-61757

CVE Title: Oracle Identity Manager Authentication Bypass Leading to Remote Code Execution

Severity: Critical

Exploit Status: Actively exploited in the wild; public technical analysis and proofofconcept available

Business Risk: Full takeover of the identity system, allowing unauthorized account control, privilege escalation, lateral movement, and disruption of access management.

Summary

CVE202561757 is a critical flaw in Oracle Identity Manager’s REST WebServices that lets attackers bypass authentication and run code remotely over HTTP. Affected versions 12.2.1.4.0 and 14.1.2.1.0 can be fully compromised, allowing control of user accounts and enterprise systems. Patched in Oracle’s October 2025 CPU, it’s actively exploited, so urgent updates are essential.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-61757?

Technical Overview

How Does the CVE-2025-61757 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-61757 Exploit Work

What Causes CVE-2025-61757?

Vulnerability Root Cause:

The issue originates from flawed authentication enforcement in Oracle Identity Manager’s REST WebServices layer. Certain REST requests are incorrectly treated as unauthenticated when specific URI suffixes are appended, allowing them to bypass the security filter. This logic error exposes protected REST handlers without requiring credentials, enabling unauthorized access that can be abused to reach highprivilege functionality and execute code remotely.

How Can You Mitigate CVE-2025-61757?

If immediate patching is delayed or not possible:  

  • Restrict network access to Oracle Identity Manager using segmentation and strict access controls.
  • Limit external and unnecessary internal connectivity to the OIM instance.
  • Deploy a Web Application Firewall (WAF) to reduce exposure until fixes are applied.
  • Closely monitor HTTP access logs for unusual requests targeting administrative REST endpoints.
  • Treat the system as potentially compromised until integrity is confirmed through forensic review.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-61757 Cause Downtime?

Patch application impact: Deploying the October 2025 CPU for Identity Manager requires minimal downtime when following standard maintenance procedures.

Mitigation (if immediate patching is not possible): Until the CPU is applied, limit OIM exposure with network restrictions, segmentation, and WAFs; these are temporary and don’t remove the risk.

How Can You Detect CVE-2025-61757 Exploitation?

Exploitation Signatures:

Look for HTTP POST requests targeting Oracle Identity Manager endpoints ending with ;.wadl, especially /iam/governance/applicationmanagement/templates;.wadl and /iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus;.wadl. Requests using the repeated known user-agent from observed scanning activity and carrying ~556-byte payloads may indicate exploitation attempts.

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Remediation Timeline:

Rollback Plan:

Incident Response Considerations:

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity indicating high impact and exploitability
Attack VectorNetworkExploitable remotely via HTTP; no local access needed
Attack ComplexityLowExploit is straightforward; no special conditions required
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction NoneExploitation requires no user action
Scope UnChanged Impact limited to Oracle Identity Manager; does not extend to unrelated systems
Confidentiality Impact HighExploit can lead to unauthorized access to sensitive identity and user data
Integrity ImpactHighExploit allows manipulation of user identities, roles, and access controls
Availability ImpactHighFull takeover of OIM can disrupt access management and provisioning

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.