CVE-2025-30735: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. in Oracle Corporation PeopleSoft Enterprise CC Common Application Objects
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI Analysis
Technical Summary
CVE-2025-30735 is a vulnerability in Oracle PeopleSoft Enterprise CC Common Application Objects, specifically version 9.2, within the Page and Field Configuration component. This flaw allows an attacker with low privileges and network access over HTTP to bypass access controls and perform unauthorized operations on critical data. The vulnerability is classified under CWE-284, indicating improper access control mechanisms. Exploitation does not require user interaction and has low complexity, making it relatively easy to exploit remotely. Successful exploitation can result in unauthorized creation, deletion, or modification of data, severely impacting the confidentiality and integrity of the PeopleSoft data store. The vulnerability does not affect availability directly but can cause significant operational disruptions due to data manipulation. The CVSS 3.1 base score of 8.1 reflects these impacts, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high confidentiality and integrity impacts (C:H/I:H). No patches or exploits are currently publicly available, but the risk remains high due to the ease of exploitation and critical nature of the data involved.
Potential Impact
The vulnerability poses a significant risk to organizations using PeopleSoft Enterprise CC Common Application Objects version 9.2. Exploitation can lead to unauthorized data manipulation, including creation, deletion, or modification of critical business data, which can compromise business operations, financial reporting, and compliance. Confidentiality breaches could expose sensitive employee, customer, or financial data, leading to regulatory penalties and reputational damage. Integrity compromises may result in corrupted or falsified data, affecting decision-making and operational reliability. Although availability is not directly impacted, the downstream effects of data corruption can cause service disruptions and require costly remediation efforts. The ease of exploitation and network accessibility increase the likelihood of attacks, especially in environments with exposed PeopleSoft HTTP interfaces. Organizations in sectors such as finance, government, healthcare, and large enterprises relying on PeopleSoft for critical business functions are particularly vulnerable.
Mitigation Recommendations
Organizations should immediately assess their exposure to PeopleSoft Enterprise CC Common Application Objects version 9.2 and restrict network access to the PeopleSoft HTTP interfaces using network segmentation, firewalls, and access control lists. Implement strict authentication and authorization policies to limit privileges of users and service accounts interacting with PeopleSoft. Monitor logs for unusual activities related to data creation, deletion, or modification within PeopleSoft. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft components. Since no patches are currently available, consider deploying virtual patching techniques or disabling non-essential PeopleSoft modules that expose the vulnerable component. Regularly update PeopleSoft and Oracle security advisories to apply patches promptly once released. Conduct penetration testing and vulnerability assessments focused on PeopleSoft environments to identify and remediate potential exploitation paths. Finally, educate administrators and users about the risks and signs of exploitation to enhance detection and response capabilities.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Japan, Brazil, Netherlands, South Africa, Singapore
CVE-2025-30735: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. in Oracle Corporation PeopleSoft Enterprise CC Common Application Objects
Description
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-30735 is a vulnerability in Oracle PeopleSoft Enterprise CC Common Application Objects, specifically version 9.2, within the Page and Field Configuration component. This flaw allows an attacker with low privileges and network access over HTTP to bypass access controls and perform unauthorized operations on critical data. The vulnerability is classified under CWE-284, indicating improper access control mechanisms. Exploitation does not require user interaction and has low complexity, making it relatively easy to exploit remotely. Successful exploitation can result in unauthorized creation, deletion, or modification of data, severely impacting the confidentiality and integrity of the PeopleSoft data store. The vulnerability does not affect availability directly but can cause significant operational disruptions due to data manipulation. The CVSS 3.1 base score of 8.1 reflects these impacts, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high confidentiality and integrity impacts (C:H/I:H). No patches or exploits are currently publicly available, but the risk remains high due to the ease of exploitation and critical nature of the data involved.
Potential Impact
The vulnerability poses a significant risk to organizations using PeopleSoft Enterprise CC Common Application Objects version 9.2. Exploitation can lead to unauthorized data manipulation, including creation, deletion, or modification of critical business data, which can compromise business operations, financial reporting, and compliance. Confidentiality breaches could expose sensitive employee, customer, or financial data, leading to regulatory penalties and reputational damage. Integrity compromises may result in corrupted or falsified data, affecting decision-making and operational reliability. Although availability is not directly impacted, the downstream effects of data corruption can cause service disruptions and require costly remediation efforts. The ease of exploitation and network accessibility increase the likelihood of attacks, especially in environments with exposed PeopleSoft HTTP interfaces. Organizations in sectors such as finance, government, healthcare, and large enterprises relying on PeopleSoft for critical business functions are particularly vulnerable.
Mitigation Recommendations
Organizations should immediately assess their exposure to PeopleSoft Enterprise CC Common Application Objects version 9.2 and restrict network access to the PeopleSoft HTTP interfaces using network segmentation, firewalls, and access control lists. Implement strict authentication and authorization policies to limit privileges of users and service accounts interacting with PeopleSoft. Monitor logs for unusual activities related to data creation, deletion, or modification within PeopleSoft. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft components. Since no patches are currently available, consider deploying virtual patching techniques or disabling non-essential PeopleSoft modules that expose the vulnerable component. Regularly update PeopleSoft and Oracle security advisories to apply patches promptly once released. Conduct penetration testing and vulnerability assessments focused on PeopleSoft environments to identify and remediate potential exploitation paths. Finally, educate administrators and users about the risks and signs of exploitation to enhance detection and response capabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-25T20:11:18.276Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1c685912abc71d0ba3e
Added to database: 2/26/2026, 7:40:54 PM
Last enriched: 2/26/2026, 8:04:55 PM
Last updated: 2/26/2026, 11:13:55 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.