Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Posted on October 7, 2025October 7, 2025 By CWS

Oct 07, 2025Ravie LakshmananCyber Assault / Ransomware
CrowdStrike on Monday stated it is attributing the exploitation of a lately disclosed safety flaw in Oracle E-Enterprise Suite with reasonable confidence to a risk actor it tracks as Sleek Spider (aka Cl0p), and that the primary recognized exploitation occurred on August 9, 2025.
The exploitation includes the exploitation of CVE-2025-61882 (CVSS rating: 9.8), a crucial vulnerability that facilitates distant code execution with out authentication.
The cybersecurity firm additionally famous that it is at the moment not recognized how a Telegram channel “insinuating” collaboration between Scattered Spider, LAPSUS$ (aka Slippy Spider), and ShinyHunters got here into the possession of an exploit for the flaw, and in the event that they and different risk actors have leveraged it in real-world assaults.
The Telegram channel has been noticed sharing the purported Oracle EBS exploit, whereas criticizing Sleek Spider’s techniques.

The noticed exercise to this point includes an HTTP request to /OA_HTML/SyncServlet, leading to an authentication bypass. The attacker then targets Oracle’s XML Writer Template Supervisor by issuing GET and POST requests to /OA_HTML/RF.jsp and /OA_HTML/OA.jsp to add and execute a malicious XSLT template,
The instructions within the malicious template are executed when it’s previewed, leading to an outbound connection from the Java internet server course of to attacker-controlled infrastructure over port 443. The connection is subsequently used to remotely load internet shells to execute instructions and set up persistence.
It is believed that a number of risk actors are in possession of the CVE-2025-61882 exploit for functions of knowledge exfiltration.
“The proof-of-concept disclosure and the CVE-2025-61882 patch launch will nearly actually encourage risk actors – notably these accustomed to Oracle EBS — to create weaponized POCs and try to leverage them in opposition to internet-exposed EBS purposes,” it stated.

In a separate evaluation, WatchTowr Labs stated, “The chain demonstrates a excessive degree of talent and energy, with at the very least 5 distinct bugs orchestrated collectively to attain pre-authenticated distant code execution.” Your complete sequence of occasions is as follows –

Ship an HTTP POST request containing a crafted XML to /OA_HTML/configurator/UiServlet to coerce the backend server to ship arbitrary HTTP requests by the use of a Server-Aspect Request Forgery (SSRF) assault
Use a Carriage Return/Line Feed (CRLF) Injection to inject arbitrary headers into the HTTP request triggered by the pre-authenticated SSRF
Use this vulnerability to smuggle requests to an internet-exposed Oracle EBS utility through “apps.instance.com:7201/OA_HTML/assist/../ieshostedsurvey.jsp” and cargo a malicious XSLT template

The assault, at its core, takes benefit of the truth that the JSP file can load an untrusted stylesheet from a distant URL, opening the door for an attacker to attain arbitrary code execution.

“This mix lets an attacker management request framing through the SSRF after which reuse the identical TCP connection to chain further requests, rising reliability and decreasing noise,” the corporate stated. “HTTP persistent connections, often known as HTTP keep-alive or connection reuse, let a single TCP connection carry a number of HTTP request/response pairs as a substitute of opening a brand new connection for each change.”

CVE-2025-61882 has since been added to the Identified Exploited Vulnerabilities (KEV) catalog by the Cybersecurity and Infrastructure Safety Company (CISA), noting that it has been utilized in ransomware campaigns, urging federal companies to use the fixes by October 27, 2025.
“Cl0p has been exploiting a number of vulnerabilities in Oracle EBS since at the very least August 2025, stealing giant quantities of knowledge from a number of victims, and has been sending extortion emails to a few of these victims since final Monday,” Jake Knott, principal safety researcher at watchTowr, stated in an announcement.
“Primarily based on the proof, we consider that is Cl0p exercise, and we totally count on to see mass, indiscriminate exploitation from a number of teams inside days. For those who run Oracle EBS, that is your crimson alert. Patch instantly, hunt aggressively, and tighten your controls — quick.”

The Hacker News Tags:Attacks, Cl0p, CVE202561882, EBS, Exploits, Fire, Oracle, RealWorld

Post navigation

Previous Post: 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System
Next Post: Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild

Related Posts

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks The Hacker News
Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions The Hacker News
Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names The Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The Hacker News
One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief The Hacker News
How to Assess and Choose the Right AI-SOC Platform How to Assess and Choose the Right AI-SOC Platform The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News