{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T06:03:42.030","vulnerabilities":[{"cve":{"id":"CVE-2025-50060","sourceIdentifier":"secalert_us@oracle.com","published":"2025-07-15T20:15:40.490","lastModified":"2025-07-24T20:57:13.433","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server).  Supported versions that are affected are 7.6.0.0.0, 8.2.0.0.0 and  12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle BI Publisher accessible data as well as  unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)."},{"lang":"es","value":"Vulnerabilidad en Oracle BI Publisher de Oracle Analytics (componente: Servidor Web). Las versiones compatibles afectadas son 7.6.0.0.0, 8.2.0.0.0 y 12.2.1.4.0. Esta vulnerabilidad, fácilmente explotable, permite a un atacante con privilegios reducidos y acceso a la red a través de HTTP comprometer Oracle BI Publisher. Los ataques con éxito pueden resultar en la creación, eliminación o modificación no autorizada de datos críticos o de todos los datos accesibles de Oracle BI Publisher, así como en el acceso no autorizado a datos críticos o a todos los datos accesibles de Oracle BI Publisher. Puntuación base de CVSS 3.1: 8.1 (Afecta a la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)."}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"AB270CE9-4B22-4AF9-9CF6-92B078B644EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:bi_publisher:8.2.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"5EF4E48D-02E2-4AF0-B8F2-0BDB1C7B4AD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"274A0CF5-41E8-42E0-9931-F7372A65B9C4"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujul2025.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]}]}}]}