Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html | Third Party Advisory VDB Entry | 
| https://www.oracle.com/security-alerts/alert-cve-2020-14750.html | Patch Vendor Advisory | 
| http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html | Third Party Advisory VDB Entry | 
| https://www.oracle.com/security-alerts/alert-cve-2020-14750.html | Patch Vendor Advisory | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-14750 | US Government Resource | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    27 Oct 2025, 17:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-14750 - US Government Resource | 
22 Oct 2025, 00:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 20:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 19:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
07 Feb 2025, 14:48
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fusion_middleware:12.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:fusion_middleware:14.1.1.0.0:*:*:*:*:*:*:* | cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* | 
| First Time | Oracle weblogic Server | 
21 Nov 2024, 05:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
| References | () https://www.oracle.com/security-alerts/alert-cve-2020-14750.html - Patch, Vendor Advisory | 
Information
                Published : 2020-11-02 21:15
Updated : 2025-10-27 17:08
NVD link : CVE-2020-14750
Mitre link : CVE-2020-14750
CVE.ORG link : CVE-2020-14750
JSON object : View
Products Affected
                oracle
- weblogic_server
CWE
                