Oracle HTTP Server & WebLogic Proxy Plug-in – Unauthenticated Improper Access Control

2026.02.23
Credit: RERO
Risk: High
Local: No
Remote: Yes

A critical improper access control vulnerability has been identified in Oracle HTTP Server and the Oracle WebLogic Proxy Plug-in. This issue allows a remote, unauthenticated attacker to bypass security restrictions and perform unauthorized actions through network-based HTTP requests. The vulnerability originates from insufficient enforcement of access control mechanisms at the proxy layer, which operates at a trusted boundary between external clients and internal application services. Due to this flaw, malicious requests may be improperly forwarded and processed with elevated trust, enabling unauthorized access to sensitive functionality. Successful exploitation can lead to a complete compromise of confidentiality and integrity, including unauthorized access to application data and backend resources accessible through the affected services. Given the remote attack vector, lack of authentication requirements, and low attack complexity, this vulnerability poses a severe security risk and should be considered critical.

References:

https://nvd.nist.gov/vuln/detail/CVE-2026-21962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21962
https://www.oracle.com/security-alerts/cpujan2026verbose.html
https://cvefeed.io/vuln/detail/CVE-2026-21962


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2026, cxsecurity.com

 

Back to Top