Skip to main content

CVE-2025-50062: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. in Oracle Corporation PeopleSoft Enterprise HCM Global Payroll Core

High
VulnerabilityCVE-2025-50062cvecve-2025-50062
Published: Tue Jul 15 2025 (07/15/2025, 19:27:34 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise HCM Global Payroll Core

Description

Vulnerability in the PeopleSoft Enterprise HCM Global Payroll Core product of Oracle PeopleSoft (component: Global Payroll for Core). Supported versions that are affected are 9.2.51 and 9.2.52. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Global Payroll Core. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise HCM Global Payroll Core accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise HCM Global Payroll Core accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:31:17 UTC

Technical Analysis

CVE-2025-50062 is a high-severity vulnerability affecting Oracle Corporation's PeopleSoft Enterprise HCM Global Payroll Core product, specifically versions 9.2.51 and 9.2.52. This vulnerability allows a low-privileged attacker with network access via HTTP to compromise the affected system without requiring user interaction. The vulnerability stems from improper access control (CWE-269), enabling unauthorized creation, deletion, or modification of critical payroll data. The CVSS 3.1 base score of 8.1 reflects high confidentiality and integrity impacts, with no impact on availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). Successful exploitation could lead to unauthorized access or complete control over all data accessible by the PeopleSoft Enterprise HCM Global Payroll Core component, potentially allowing attackers to manipulate sensitive payroll information, disrupt payroll processing, or exfiltrate confidential employee data. Although no known exploits are currently reported in the wild, the ease of exploitation and critical nature of the data involved make this a significant threat. The vulnerability affects a core payroll module widely used in enterprise human capital management, making it a prime target for attackers seeking financial fraud, insider data theft, or disruption of payroll operations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the critical nature of payroll data and the regulatory environment surrounding employee data protection, such as GDPR. Unauthorized modification or deletion of payroll data can lead to financial losses, compliance violations, and reputational damage. Attackers gaining access to payroll systems could manipulate salary payments, create fraudulent records, or exfiltrate personally identifiable information (PII), leading to identity theft or insider threats. The compromise of payroll data integrity can disrupt business operations and employee trust. Given the network-based attack vector and low privilege requirement, attackers could exploit this vulnerability remotely, increasing the risk for organizations with exposed PeopleSoft HCM Global Payroll Core interfaces. The lack of user interaction requirement further lowers the barrier for exploitation. European organizations relying on Oracle PeopleSoft for payroll processing must consider this vulnerability a critical operational and compliance risk.

Mitigation Recommendations

1. Immediate application of vendor patches or updates once available is the most effective mitigation. Since no patch links are currently provided, organizations should monitor Oracle security advisories closely. 2. Restrict network access to PeopleSoft Enterprise HCM Global Payroll Core HTTP interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted internal networks only. 3. Implement strict access control policies and review user privileges regularly to minimize the number of users with low-level network access that could be leveraged for exploitation. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft payroll endpoints. 5. Conduct thorough logging and monitoring of PeopleSoft application access and changes to payroll data to detect unauthorized activities promptly. 6. Perform regular security assessments and penetration testing focusing on PeopleSoft HCM modules to identify and remediate potential weaknesses. 7. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation attempts are detected. 8. Consider temporary disabling or isolating affected PeopleSoft modules if immediate patching is not feasible, to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-11T22:56:56.109Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b00aa83201eaacd04422

Added to database: 7/15/2025, 7:46:18 PM

Last enriched: 7/22/2025, 8:31:17 PM

Last updated: 8/8/2025, 10:23:36 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats