Skip to main content

CVE-2025-30748: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools

Medium
VulnerabilityCVE-2025-30748cvecve-2025-30748
Published: Tue Jul 15 2025 (07/15/2025, 19:27:28 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise PeopleTools

Description

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:41:07 UTC

Technical Analysis

CVE-2025-30748 is a medium-severity vulnerability affecting Oracle Corporation's PeopleSoft Enterprise PeopleTools versions 8.60, 8.61, and 8.62, specifically within the PIA Core Technology component. This vulnerability allows an unauthenticated attacker with network access via HTTP to compromise the PeopleSoft Enterprise PeopleTools environment. Exploitation requires user interaction from a person other than the attacker, indicating a social engineering or phishing vector is involved. The vulnerability leads to unauthorized capabilities including update, insert, or delete operations on some accessible PeopleSoft data, as well as unauthorized read access to a subset of that data. The CVSS 3.1 base score is 6.1, reflecting a medium severity with impacts primarily on confidentiality and integrity but no impact on availability. The attack vector is network-based (AV:N), requires no privileges (PR:N), has low attack complexity (AC:L), but requires user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The CWE associated is CWE-863, which relates to improper authorization. Although no known exploits are reported in the wild yet, the vulnerability is easily exploitable given the low complexity and lack of authentication requirements. The vulnerability’s impact extends beyond PeopleTools itself, potentially affecting other integrated PeopleSoft products due to the scope change. This could lead to unauthorized data manipulation and disclosure within enterprise environments relying on PeopleSoft for critical business functions.

Potential Impact

For European organizations, the impact of CVE-2025-30748 could be significant, particularly for those using PeopleSoft Enterprise PeopleTools for HR, finance, supply chain, or other enterprise resource planning functions. Unauthorized read access could lead to exposure of sensitive personal data, financial information, or intellectual property, raising compliance risks under GDPR and other data protection regulations. Unauthorized update, insert, or delete operations could disrupt business processes, corrupt data integrity, and cause operational disruptions without causing outright denial of service. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger exploitation, increasing the risk of targeted attacks. The scope change indicates that the vulnerability could affect multiple integrated products, amplifying the potential damage. Organizations in sectors such as finance, manufacturing, public administration, and education that rely heavily on PeopleSoft may face risks of data breaches, regulatory penalties, reputational damage, and operational inefficiencies.

Mitigation Recommendations

1. Immediate patching: Although no patch links are provided in the data, organizations should monitor Oracle’s official security advisories and apply patches or mitigations as soon as they become available. 2. Network segmentation: Restrict HTTP access to PeopleSoft Enterprise PeopleTools interfaces to trusted internal networks or VPNs to reduce exposure to unauthenticated attackers. 3. User awareness training: Since exploitation requires user interaction, conduct targeted phishing awareness campaigns to reduce the risk of social engineering attacks. 4. Implement strict access controls: Enforce least privilege principles and monitor for unusual data access or modification activities within PeopleSoft environments. 5. Web application firewall (WAF): Deploy and tune WAF rules to detect and block suspicious HTTP requests targeting PeopleSoft components. 6. Multi-factor authentication (MFA): Although the vulnerability does not require authentication, enforcing MFA on PeopleSoft access can reduce the impact of credential compromise and lateral movement. 7. Logging and monitoring: Enable detailed logging of PeopleSoft access and changes, and implement real-time alerting for anomalous activities to enable rapid incident response. 8. Incident response planning: Prepare for potential exploitation scenarios by having clear procedures to isolate affected systems and remediate data integrity issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b008a83201eaacd043dd

Added to database: 7/15/2025, 7:46:16 PM

Last enriched: 7/23/2025, 1:41:07 AM

Last updated: 8/13/2025, 9:34:38 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats