CVE-2025-61757 is a critical pre-authentication remote code execution (RCE) vulnerability in the REST WebServices component of Oracle Identity Manager (OIM), part of Oracle Fusion Middleware. Supported versions 12.2.1.4.0 and 14.1.2.1.0 are affected.
Assigned a CVSS 3.1 score of 9.8, the flaw allows an unauthenticated attacker on the network to bypass REST authentication filters using crafted URL suffixes and reach privileged endpoints that enable arbitrary code execution.
Oracle released a fix in the October 21, 2025 Critical Patch Update (CPU).
CISA added the vulnerability to the KEV list after validating active exploitation. Earlier scan activity observed between August 30 and September 9, 2025—initially thought to be exploitation—was later attributed to research activity, but exploitation is now confirmed.
;.wadl or ?WSDL to REST URIs, an attacker can bypass the authentication filter and reach protected API handlers.Because OIM centrally manages identity lifecycle and entitlements, exploitation can result in widespread access escalation across the enterprise.
Use the Oracle Identity Manager CVE-2025-61757 Rapid Response test to determine whether affected OIM instances—internal or internet-facing—are exploitable in your environment.
Apply Oracle’s October 2025 Critical Patch Update for Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0.
Follow Oracle’s SPB tooling and CPU guidance to ensure all prerequisites are met.
Verify that OIM instances are no longer exploitable.
| Indicator | Type | Description |
Requests to OIM REST endpoints with ;.wadl or ?WSDL | Network | Look for anomalous HTTP access to /iam/governance/* or similar REST paths ending in metadata suffixes. |
Unusual traffic to /iam or REST admin endpoints | Network | Especially from foreign IPs, TOR/VPN sources, or after-hours administrative activity windows. |
| Groovy compilation endpoint access | Network / App Logs | Requests initiating compilation actions or containing suspicious Groovy syntax. |
| JVM child processes | Host | java or WebLogic spawning shell processes or script interpreters. |
| Unexpected privileged account creation | Identity | Sudden changes in entitlements, role assignments, or workflow states originating from OIM. |
| New outbound connections from OIM hosts | Network | Connections to unfamiliar external endpoints following suspicious REST requests. |
🔗 Oracle Critical Patch Update Advisory — October 2025
🔗 NVD Entry for CVE-2025-61757
🔗 CISA Known Exploited Vulnerabilities Catalog
🔗 Searchlight Cyber Technical Analysis
🔗 Public Reporting: The Hacker News
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.