CVE-2025-50062: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. in Oracle Corporation PeopleSoft Enterprise HCM Global Payroll Core
Vulnerability in the PeopleSoft Enterprise HCM Global Payroll Core product of Oracle PeopleSoft (component: Global Payroll for Core). Supported versions that are affected are 9.2.51 and 9.2.52. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI Analysis
Technical Summary
CVE-2025-50062 is a high-severity vulnerability affecting Oracle Corporation's PeopleSoft Enterprise HCM Global Payroll Core product, specifically versions 9.2.51 and 9.2.52. This vulnerability allows a low-privileged attacker with network access via HTTP to compromise the affected system without requiring user interaction. The vulnerability stems from improper access control (CWE-269), enabling unauthorized creation, deletion, or modification of critical payroll data. The CVSS 3.1 base score of 8.1 reflects high confidentiality and integrity impacts, with no impact on availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). Successful exploitation could lead to unauthorized access or complete control over all data accessible by the PeopleSoft Enterprise HCM Global Payroll Core component, potentially allowing attackers to manipulate sensitive payroll information, disrupt payroll processing, or exfiltrate confidential employee data. Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the data involved make this a significant threat. The vulnerability affects a core payroll module widely used in enterprise human capital management, making it a prime target for attackers seeking financial fraud, insider data theft, or disruption of payroll operations.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the critical nature of payroll data and the regulatory environment surrounding employee data protection, such as GDPR. Unauthorized modification or deletion of payroll data can lead to financial losses, compliance violations, and reputational damage. Attackers gaining access to payroll systems could manipulate salary payments, create fraudulent records, or exfiltrate personally identifiable information (PII), leading to identity theft or insider threats. The compromise of payroll data integrity can disrupt business operations and employee trust. Given the network-based attack vector and low privilege requirement, attackers could exploit this vulnerability remotely, increasing the risk for organizations with exposed PeopleSoft HCM Global Payroll Core interfaces. The lack of user interaction requirement further lowers the barrier for exploitation. European organizations relying on Oracle PeopleSoft for payroll processing must consider this vulnerability a critical operational and compliance risk.
Mitigation Recommendations
1. Immediate application of vendor patches or updates once available is the most effective mitigation. Since no patch links are currently provided, organizations should monitor Oracle security advisories closely. 2. Restrict network access to PeopleSoft Enterprise HCM Global Payroll Core HTTP interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted internal networks only. 3. Implement strict access control policies and review user privileges regularly to minimize the number of users with low-level network access that could be leveraged for exploitation. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft payroll endpoints. 5. Conduct thorough logging and monitoring of PeopleSoft application access and changes to payroll data to detect unauthorized activities promptly. 6. Perform regular security assessments and penetration testing focusing on PeopleSoft HCM modules to identify and remediate potential weaknesses. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation attempts are detected. 8. Consider temporary disabling or isolating affected PeopleSoft modules if immediate patching is not feasible, to reduce attack surface.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-50062: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. in Oracle Corporation PeopleSoft Enterprise HCM Global Payroll Core
Description
Vulnerability in the PeopleSoft Enterprise HCM Global Payroll Core product of Oracle PeopleSoft (component: Global Payroll for Core). Supported versions that are affected are 9.2.51 and 9.2.52. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-50062 is a high-severity vulnerability affecting Oracle Corporation's PeopleSoft Enterprise HCM Global Payroll Core product, specifically versions 9.2.51 and 9.2.52. This vulnerability allows a low-privileged attacker with network access via HTTP to compromise the affected system without requiring user interaction. The vulnerability stems from improper access control (CWE-269), enabling unauthorized creation, deletion, or modification of critical payroll data. The CVSS 3.1 base score of 8.1 reflects high confidentiality and integrity impacts, with no impact on availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). Successful exploitation could lead to unauthorized access or complete control over all data accessible by the PeopleSoft Enterprise HCM Global Payroll Core component, potentially allowing attackers to manipulate sensitive payroll information, disrupt payroll processing, or exfiltrate confidential employee data. Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the data involved make this a significant threat. The vulnerability affects a core payroll module widely used in enterprise human capital management, making it a prime target for attackers seeking financial fraud, insider data theft, or disruption of payroll operations.
Potential Impact
For European organizations, this vulnerability poses a substantial risk due to the critical nature of payroll data and the regulatory environment surrounding employee data protection, such as GDPR. Unauthorized modification or deletion of payroll data can lead to financial losses, compliance violations, and reputational damage. Attackers gaining access to payroll systems could manipulate salary payments, create fraudulent records, or exfiltrate personally identifiable information (PII), leading to identity theft or insider threats. The compromise of payroll data integrity can disrupt business operations and employee trust. Given the network-based attack vector and low privilege requirement, attackers could exploit this vulnerability remotely, increasing the risk for organizations with exposed PeopleSoft HCM Global Payroll Core interfaces. The lack of user interaction requirement further lowers the barrier for exploitation. European organizations relying on Oracle PeopleSoft for payroll processing must consider this vulnerability a critical operational and compliance risk.
Mitigation Recommendations
1. Immediate application of vendor patches or updates once available is the most effective mitigation. Since no patch links are currently provided, organizations should monitor Oracle security advisories closely. 2. Restrict network access to PeopleSoft Enterprise HCM Global Payroll Core HTTP interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted internal networks only. 3. Implement strict access control policies and review user privileges regularly to minimize the number of users with low-level network access that could be leveraged for exploitation. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft payroll endpoints. 5. Conduct thorough logging and monitoring of PeopleSoft application access and changes to payroll data to detect unauthorized activities promptly. 6. Perform regular security assessments and penetration testing focusing on PeopleSoft HCM modules to identify and remediate potential weaknesses. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation attempts are detected. 8. Consider temporary disabling or isolating affected PeopleSoft modules if immediate patching is not feasible, to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-06-11T22:56:56.109Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b00aa83201eaacd04422
Added to database: 7/15/2025, 7:46:18 PM
Last enriched: 7/22/2025, 8:31:17 PM
Last updated: 8/8/2025, 10:23:36 PM
Views: 16
Related Threats
CVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumCVE-2025-55726
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.