CVE-2019-2725

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
References
Link Resource
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html Patch Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch Vendor Advisory
http://www.securityfocus.com/bid/108074 Broken Link
https://support.f5.com/csp/article/K90059138 Third Party Advisory
https://www.exploit-db.com/exploits/46780/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Patch Vendor Advisory
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html Patch Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch Vendor Advisory
http://www.securityfocus.com/bid/108074 Broken Link
https://support.f5.com/csp/article/K90059138 Third Party Advisory
https://www.exploit-db.com/exploits/46780/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Patch Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:agile_plm:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:agile_plm:9.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:5.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tape_library_acsls:8.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tape_virtual_storage_manager_gui:6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:5.2.36:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*

History

27 Oct 2025, 17:08

Type Values Removed Values Added
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 - US Government Resource

22 Oct 2025, 00:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 -

21 Oct 2025, 20:17

Type Values Removed Values Added
References
  • {'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}

21 Oct 2025, 19:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725 -

21 Nov 2024, 04:41

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References () http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html - Patch, Vendor Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/108074 - Broken Link () http://www.securityfocus.com/bid/108074 - Broken Link
References () https://support.f5.com/csp/article/K90059138 - Third Party Advisory () https://support.f5.com/csp/article/K90059138 - Third Party Advisory
References () https://www.exploit-db.com/exploits/46780/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46780/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW - Patch, Vendor Advisory
References () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Vendor Advisory

Information

Published : 2019-04-26 19:29

Updated : 2025-10-27 17:08


NVD link : CVE-2019-2725

Mitre link : CVE-2019-2725

CVE.ORG link : CVE-2019-2725


JSON object : View

Products Affected

oracle

  • agile_plm
  • vm_virtualbox
  • tape_library_acsls
  • weblogic_server
  • tape_virtual_storage_manager_gui
  • peoplesoft_enterprise_peopletools
  • communications_converged_application_server
  • storagetek_tape_analytics_sw_tool
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')