The flaw, tracked as CVE-2026-21962, carries a perfect CVSS score of 10.0, the highest possible rating for a vulnerability.
It allows unauthenticated attackers to remotely execute arbitrary operating system commands on vulnerable WebLogic servers without needing any credentials.
Exploitation began on January 22, 2026, the exact day the proof-of-concept code went public, leaving organizations with virtually no reaction time.
Researchers from CloudSEK deployed a high-interaction honeypot simulating a vulnerable Oracle WebLogic Server and monitored attacker behavior over a 12-day observation period.
The data captured an immediate and aggressive surge in automated scanning and exploitation attempts targeting the flaw.
Attackers exploit CVE-2026-21962 by sending specially crafted HTTP GET requests that use path traversal techniques to reach proxy endpoints.
This trick bypasses the server’s authentication layer entirely, allowing adversaries to run any command on the underlying operating system, effectively taking full control of the affected server.
The attack infrastructure was primarily built on rented Virtual Private Servers, with hosting providers like HOSTGLOBAL.PLUS and DigitalOcean are frequently abused to mask the true origin of attacks and scale operations.
Automated tools such as the botnet scanner libredtail-http and the Nmap Scripting Engine generated the highest volume of malicious requests.
The honeypot also detected persistent exploitation of several older, equally critical WebLogic vulnerabilities that threat actors have refused to abandon:
Researchers also noted a broad “spray and pray” strategy, with attackers probing honeypot servers for non-Oracle flaws, including well-known Hikvision and PHPUnit vulnerabilities, demonstrating how quickly threat actors adapt generic web reconnaissance tools to find any available entry point.
Security teams must act without delay to reduce exposure:
wget or curl calls, which can indicate a successful breach in its early stages.The pattern of immediate exploitation following public disclosure reinforces a critical security truth: for maximum-severity vulnerabilities, patch windows are measured in hours, not weeks.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Active Attacks Target Critical WebLogic Remote Code Execution Flaws appeared first on Cyber Security News.
DETROIT — An urgent investigation is underway in Detroit after multiple students were hospitalized this…
LANSING, Mich. — A major budget standoff is now underway in Michigan after state Senate…
STARKE COUNTY, IND. (WOWO) A former employee of the Starke County Sheriff’s Department has pleaded…
The status of New Hampshire’s end to mandatory car inspections might still be murky in…
Five major dairy farms populated the half-mile stretch of Upper City Road in Pittsfield where…
Resident Evil Requiem players were sad to see the Merchant left out of Leon's latest…
This website uses cookies.