Skip to main content

CVE-2025-30747: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools

Medium
VulnerabilityCVE-2025-30747cvecve-2025-30747
Published: Tue Jul 15 2025 (07/15/2025, 19:27:27 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise PeopleTools

Description

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:37:10 UTC

Technical Analysis

CVE-2025-30747 is a medium-severity vulnerability affecting Oracle Corporation's PeopleSoft Enterprise PeopleTools, specifically versions 8.60, 8.61, and 8.62. The vulnerability resides in the PIA Core Technology component and allows an unauthenticated attacker with network access via HTTP to potentially compromise the system. Exploitation requires human interaction from a user other than the attacker, indicating a social engineering element is necessary to trigger the vulnerability. Successful exploitation results in unauthorized read access to a subset of data accessible through PeopleSoft Enterprise PeopleTools. The CVSS 3.1 base score is 4.3, reflecting a low confidentiality impact without affecting integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to confidentiality (C:L) with no impact on integrity (I:N) or availability (A:N). The underlying weakness is classified under CWE-863, which relates to improper authorization. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could be exploited by tricking a user into performing an action that allows the attacker to read sensitive data from PeopleSoft systems over HTTP, potentially exposing confidential organizational information.

Potential Impact

For European organizations using Oracle PeopleSoft Enterprise PeopleTools versions 8.60 to 8.62, this vulnerability poses a risk of unauthorized disclosure of sensitive data. Although the impact is limited to confidentiality and does not affect system integrity or availability, unauthorized read access can lead to exposure of personal data, intellectual property, or other sensitive business information. This could result in regulatory compliance issues under GDPR, reputational damage, and potential financial penalties. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk in environments with less user security awareness. Since PeopleSoft is widely used in sectors such as government, education, and large enterprises across Europe, the vulnerability could be leveraged to gain insights into internal processes or personnel data, which could be further exploited in targeted attacks or espionage. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Implement strict network segmentation and firewall rules to restrict HTTP access to PeopleSoft Enterprise PeopleTools interfaces only to trusted internal users and systems. 2) Enhance user awareness training focused on phishing and social engineering to reduce the likelihood of successful user interaction exploitation. 3) Monitor network traffic and application logs for unusual access patterns or attempts to exploit PeopleSoft HTTP interfaces. 4) Apply principle of least privilege to PeopleSoft users to limit data exposure if compromised. 5) Since no patches are currently linked, organizations should engage with Oracle support to obtain timely updates or workarounds as they become available. 6) Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft endpoints. 7) Conduct regular vulnerability assessments and penetration testing focused on PeopleSoft environments to identify and remediate exposure. 8) Review and harden PeopleSoft configuration settings to minimize unnecessary data exposure over HTTP.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b008a83201eaacd043da

Added to database: 7/15/2025, 7:46:16 PM

Last enriched: 7/23/2025, 1:37:10 AM

Last updated: 8/18/2025, 11:32:42 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats