CISA is sounding the alarm on CVE-2025-61757, a sneaky pre-authentication remote code execution flaw in Oracle Identity Manager that’s already being exploited by bad actors, possibly as a zero-day vulnerability since late August. This issue lets attackers bypass authentication in the REST APIs by tacking on simple parameters like ?WSDL or ;.wadl, granting unauthorized access to Groovy scripts that can then be weaponized to run malicious code during compilation. Discovered by Searchlight Cyber researchers and patched in Oracle’s October updates, this flaw is surprisingly easy to exploit compared to other Oracle vulnerabilities, making it a prime target for cybercriminals. For SMBs and MSPs relying on Oracle tools, this means double-checking your systems for unpatched instances and prioritizing that December 12 deadline for fixes, because ignoring it could leave your network wide open to attacks that disrupt operations or steal data. Meanwhile, keep an eye on unusual traffic patterns, like those shady HTTP POST requests hitting specific endpoints, to stay one step ahead of these digital intruders.