CVE-2026-21962
10.00.03%
The Proxy That Talked Too Much: Dissecting CVE-2026-21962
Amit Schendel
Senior Security ResearcherJan 22, 2026·7 min read·614 visits
PoC Available
Executive Summary (TL;DR)
Oracle's January 2026 CPU dropped a bombshell: a CVSS 10.0 RCE in the WebLogic Proxy Plug-in. By combining a path normalization bypass (`..;`) with a header injection attack (`WL-Proxy-Client-IP`), unauthenticated attackers can gain root access to the underlying server. Exploits are public and trivial.
A critical RCE in Oracle HTTP Server and WebLogic Proxy Plug-in allows unauthenticated attackers to execute arbitrary commands via malicious HTTP headers and path traversal techniques.
Official Patches
Technical Appendix
CVSS Score
10.0/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:NEPSS Probability
0.03%
Top 92% most exploited
50,000
Estimated exposed hosts via Shodan
Affected Systems
Oracle HTTP Server 12.2.1.4.0Oracle HTTP Server 14.1.1.0.0Oracle HTTP Server 14.1.2.0.0Oracle WebLogic Server Proxy Plug-in (Apache/IIS)
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
Oracle HTTP Server Oracle | 12.2.1.4.0 | Jan 2026 CPU |
WebLogic Server Proxy Plug-in Oracle | 14.1.1.0.0 | Jan 2026 CPU |
| Attribute | Detail |
|---|---|
| CVSS | 10.0 (Critical) |
| CWE | CWE-444, CWE-77 |
| Attack Vector | Network (Unauthenticated) |
| EPSS | 0.00031 (Rising) |
| Exploit Status | Public PoC Available |
| Key Vector | WL-Proxy-Client-IP Header |
MITRE ATT&CK Mapping
CWE-77
Command Injection
Improper Neutralization of Special Elements used in a Command
Known Exploits & Detection
Vulnerability Timeline
Pre-advisory notification
2026-01-05
CVE Published in Oracle CPU
2026-01-20
Public PoC Released
2026-01-21
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.