Oracle Identity Manager Pre-Auth RCE | CISA KEV

CVE-2025-61757 is a critical pre-authentication remote code execution (RCE) vulnerability in the REST WebServices component of Oracle Identity Manager (OIM), part of Oracle Fusion Middleware. Supported versions 12.2.1.4.0 and 14.1.2.1.0 are affected. 

Assigned a CVSS 3.1 score of 9.8, the flaw allows an unauthenticated attacker on the network to bypass REST authentication filters using crafted URL suffixes and reach privileged endpoints that enable arbitrary code execution.

Oracle released a fix in the October 21, 2025 Critical Patch Update (CPU). 

CISA added the vulnerability to the KEV list after validating active exploitation. Earlier scan activity observed between August 30 and September 9, 2025—initially thought to be exploitation—was later attributed to research activity, but exploitation is now confirmed.

Stop Guessing, Start Proving

NodeZero attack path showing how CVE-2025-61757 enables pre-authentication remote code execution in Oracle Identity Manager

Technical Details

  • Root Cause
    By appending metadata-style suffixes such as ;.wadl or ?WSDL to REST URIs, an attacker can bypass the authentication filter and reach protected API handlers.
  • RCE Path
    After bypassing the filter, an attacker can reach an exposed Groovy script endpoint that is meant for checking Groovy code. By writing an annotation that executes at compile time, researchers were able to execute arbitrary code.
  • Impact
    Full compromise of the OIM server, including the ability to:
    • Modify or create privileged accounts
    • Tamper with provisioning workflows
    • Interfere with MFA, SSO, or downstream identity systems
    • Establish persistence on the WebLogic/OIM host
    • Move laterally into connected directories and SaaS identity integrations

Because OIM centrally manages identity lifecycle and entitlements, exploitation can result in widespread access escalation across the enterprise.

NodeZero® Offensive Security Platform — Rapid Response

1. Run a Rapid Response Test

Use the Oracle Identity Manager CVE-2025-61757 Rapid Response test to determine whether affected OIM instances—internal or internet-facing—are exploitable in your environment.

2. Patch Immediately

Apply Oracle’s October 2025 Critical Patch Update for Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0.
Follow Oracle’s SPB tooling and CPU guidance to ensure all prerequisites are met.

3. Re-run the Rapid Response Test After Patching

Verify that OIM instances are no longer exploitable. 

Indicators of Compromise

IndicatorTypeDescription
Requests to OIM REST endpoints with ;.wadl or ?WSDLNetworkLook for anomalous HTTP access to /iam/governance/* or similar REST paths ending in metadata suffixes.
Unusual traffic to /iam or REST admin endpointsNetworkEspecially from foreign IPs, TOR/VPN sources, or after-hours administrative activity windows.
Groovy compilation endpoint accessNetwork / App LogsRequests initiating compilation actions or containing suspicious Groovy syntax.
JVM child processesHostjava or WebLogic spawning shell processes or script interpreters.
Unexpected privileged account creationIdentitySudden changes in entitlements, role assignments, or workflow states originating from OIM.
New outbound connections from OIM hostsNetworkConnections to unfamiliar external endpoints following suspicious REST requests.

Affected Versions & Patch

Affected Versions

  • Oracle Identity Manager 12.2.1.4.0
  • Oracle Identity Manager 14.1.2.1.0

Patch

  • Fixed in Oracle Critical Patch Update (CPU) — October 21, 2025
  • Apply the CPU or stack patch bundle (SPB) for your environment
  • Ensure WebLogic and database prerequisites are satisfied

Timeline

  • August 30 – September 9, 2025: Scan activity consistent with the exploit observed (later attributed to researcher activity).
  • October 21, 2025: Oracle releases CPU including fix for CVE-2025-61757.
  • November 21, 2025: CISA adds CVE-2025-61757 to the KEV catalog.
  • November 24, 2025: NodeZero Rapid Response test becomes available.

References

🔗 Oracle Critical Patch Update Advisory — October 2025
🔗 NVD Entry for CVE-2025-61757
🔗 CISA Known Exploited Vulnerabilities Catalog
🔗 Searchlight Cyber Technical Analysis
🔗 Public Reporting: The Hacker News

Read about other CVEs

NodeZero® Platform

Implement a continuous find, fix, and verify loop with NodeZero

The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.
Explore NodeZero

Recognized By