4.3
CVE-2025-21528
- EPSS 0.02%
- Published 21.01.2025 21:15:18
- Last modified 18.06.2025 19:19:45
- Source secalert_us@oracle.com
- Teams watchlist Login
- Open Login
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Oracle ≫ Primavera P6 Enterprise Project Portfolio Management Version >= 20.12.1.0 <= 20.12.21.5
Oracle ≫ Primavera P6 Enterprise Project Portfolio Management Version >= 21.12.1.0 <= 21.12.20.0
Oracle ≫ Primavera P6 Enterprise Project Portfolio Management Version >= 22.12.1.0 <= 22.12.16.0
Oracle ≫ Primavera P6 Enterprise Project Portfolio Management Version >= 23.12.1.0 <= 23.12.10.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.05 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert_us@oracle.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.