Oops, Oracle Did It Again! Trivial Exploit Raises Security Eyebrows
In a plot twist worthy of a cyber-thriller, Searchlight Cyber reveals CVE-2025-61757, a vulnerability so easy to exploit that it almost feels like cheating. Just add “;.wadl” to a URL, and voilà—remote code execution! Oracle’s patch is out, but not before some sneaky visitors left their mark.

Hot Take:
Looks like Oracle had a “wadl” of a time with this one! When a simple URL tweak can lead to remote code execution, it’s like leaving your front door open with a neon sign saying “Hackers Welcome.” At least they’ve patched it up just in time for Halloween, so no more trick-or-treating through their software vulnerabilities.
Key Points:
- Searchlight Cyber uncovered a vulnerability, CVE-2025-61757, affecting Oracle software.
- The exploit involves appending “;.wadl” to URLs to bypass authentication.
- A proof of concept demonstrates how this can lead to remote code execution.
- Suspicious URL access occurred between August 30th and September 9th, pre-patch.
- Multiple IP addresses with the same user agent were involved, hinting at a single attacker.
Already a member? Log in here
