At a glance: A maximum-severity vulnerability affecting Oracle HTTP Server and the Oracle WebLogic Server Proxy Plugin is being actively probed in the wild. Tracked as CVE-2026-21962, the flaw allows unauthenticated attackers to bypass proxy access controls via path traversal and header manipulation, potentially leading to remote code execution and full compromise of backend WebLogic Server instances.
Threat summary
On 20 January 2026, Oracle released the official patch for CVE-2026-21962 as part of its January 2026 Critical Patch Update.
The vulnerability affects Oracle HTTP Server and the Oracle WebLogic Server Proxy Plugin in the following versions:
-
12.2.1.4.0
-
14.1.1.0.0
-
14.1.2.0.0
Oracle HTTP Server and the WebLogic Server Proxy Plugin serve as a traffic-handling layer between external clients and backend WebLogic Server instances. These components are widely deployed in enterprise environments to support application delivery, creating a broad attack surface across organizations using Oracle Fusion Middleware.
The issue is caused by improper access control in the proxy plugin, allowing unauthenticated users to manipulate path normalization and inject malicious headers to reach internal WebLogic endpoints. This exposure enables remote code execution and unauthorized modification of critical data. Any remote, unauthenticated threat actor with Hypertext Transfer Protocol (HTTP) access can attempt exploitation.
The impact could include unauthorized access to internal WebLogic endpoints, remote code execution, and full compromise of backend systems. The worst-case scenario involves takeover of WebLogic Server instances and subsequent lateral movement across enterprise networks.
The flaw received a maximum Common Vulnerability Scoring System score of 10.0.
The Canadian Centre for Cyber Security reported that a public proof-of-concept (POC) was available as of January 21. On 28 January 2026, the SANS Internet Storm Center reported unusual inbound requests targeting WebLogic paths, including malformed traversal sequences and injected headers, matching patterns associated with CVE-2026-21962 exploitation.
At this time, it's unclear whether any specific POC reliably achieves exploitation in practice.
Analysis & mitigation
We recommend prioritizing patch deployment across all Oracle HTTP Server and WebLogic Server Proxy Plugin instances to immediately reduce exposure to active scanning and potential exploitation. Field Effect MDR users will be alerted via ARO if vulnerable systems are detected in their environment.
Further, limit network reachability to Oracle HTTP Server and the WebLogic Server Proxy Plug‑in. Restricting access to trusted internal segments or known application front ends lowers the chance of opportunistic probing reaching the vulnerable service. This can be enforced at the network firewall by limiting which hosts and networks are permitted to reach the Oracle HTTP Server or WebLogic Proxy Plug‑in.
To identify early reconnaissance, increase log verbosity on Oracle HTTP Server and review logs for suspicious patterns, such as:
-
Unexpected `..;` traversal sequences
-
Duplicate WebLogic path prefixes
-
Unusual `WL-Proxy-Client-IP` header values
A common compensating control for path traversal and header manipulation attacks is to place a reverse proxy or Web Application Firewall (WAF) in front of Oracle HTTP Server (OHS) to block malformed paths and header injection attempts.
As per Oracle’s guidance for WebLogic deployments, validating that internal WebLogic endpoints such as `bea_wls_internal` are not reachable from untrusted networks could reduce the risk.
Even though the vulnerability is unauthenticated, attackers who gain access may attempt to escalate privileges or harvest credentials. Monitoring for unusual authentication attempts or new administrative sessions provides additional visibility.
Continuous monitoring for anomalous WebLogic-related requests, including traversal sequences and suspicious proxy headers, is recommended to detect early probing or exploitation attempts.