PT-2026-3709 · Oracle · Oracle Http Server+1

Ashwesker

·

Published

2026-01-20

·

Updated

2026-05-07

·

CVE-2026-21962

CVSS v3.1

10

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Name of the Vulnerable Software and Affected Versions Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in for Apache HTTP Server, and Oracle Weblogic Server Proxy Plug-in for IIS versions 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0 are affected.
Description An easily exploitable vulnerability exists in Oracle HTTP Server and Oracle Weblogic Server Proxy Plug-in, allowing an unauthenticated attacker with network access via HTTP to compromise the system. Successful exploitation can result in unauthorized creation, deletion, or modification of critical data. Active exploitation of this vulnerability has been observed worldwide, with attackers utilizing automated scanning and exploit attempts. The vulnerability allows for unauthenticated remote code execution, potentially leading to full system compromise, malware deployment, and data theft. Attackers are leveraging path traversal techniques and exploiting the ProxyServlet component. The vulnerability has a CVSS score of 10.0.
Recommendations Immediately apply the Oracle Critical Patch Update (Jan 2026) for affected Oracle HTTP Server / WebLogic proxy components. Do not expose WebLogic admin consoles or proxy endpoints to the public internet; restrict access via VPN, bastion, or firewall allowlists. Deploy and tune WAF rules to detect/block known path-traversal and ProxyServlet exploit patterns. Monitor logs for suspicious commands and unexpected processes. Rotate credentials and review logs for signs of compromise.

Exploit

Fix

RCE

Improper Access Control

Improper Authentication

Weakness Enumeration

Related Identifiers

BDU:2026-00664
CVE-2026-21962

Affected Products

Oracle Http Server
Oracle Weblogic Server Proxy Plug-In