Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53065: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools

0
Medium
VulnerabilityCVE-2025-53065cvecve-2025-53065
Published: Tue Oct 21 2025 (10/21/2025, 20:03:04 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise PeopleTools

Description

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 10/28/2025, 21:15:37 UTC

Technical Analysis

CVE-2025-53065 is a vulnerability identified in Oracle PeopleSoft Enterprise PeopleTools, specifically affecting versions 8.60, 8.61, and 8.62. The flaw resides in the PIA Core Technology component and allows an unauthenticated attacker with network access via HTTP to exploit the system. The attack vector requires no privileges and low attack complexity, but successful exploitation necessitates user interaction from a third party, such as clicking a malicious link or opening a crafted file. Exploitation can lead to unauthorized read access and unauthorized modification (update, insert, delete) of some PeopleSoft accessible data, compromising confidentiality and integrity. The vulnerability does not affect availability. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) indicates network attack vector, low complexity, no privileges required, user interaction required, unchanged scope, and low confidentiality and integrity impacts. The CWE-125 classification suggests a possible out-of-bounds read or similar memory handling issue. No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating the need for vigilance and interim mitigations. Given PeopleSoft's role in enterprise resource planning, human capital management, and financial systems, exploitation could lead to unauthorized data manipulation and exposure, affecting business operations and compliance.

Potential Impact

For European organizations, the impact of CVE-2025-53065 could be significant due to the widespread adoption of Oracle PeopleSoft in sectors such as finance, government, healthcare, and manufacturing. Unauthorized read access could expose sensitive personal data, financial records, or strategic business information, leading to privacy violations and regulatory non-compliance under GDPR. Unauthorized data modification could disrupt business processes, cause financial inaccuracies, or corrupt critical records, potentially leading to operational downtime or reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing risk in environments with less mature security awareness. The lack of availability impact reduces the risk of denial-of-service conditions but does not diminish the threat to data integrity and confidentiality. Organizations with PeopleSoft systems exposed to the internet or accessible networks face higher risk, especially if they have not implemented network segmentation or strict access controls.

Mitigation Recommendations

1. Restrict network access to PeopleSoft Enterprise PeopleTools HTTP interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. 2. Enhance user awareness training focused on phishing and social engineering to reduce the likelihood of successful user interaction exploitation. 3. Monitor PeopleSoft logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected data modification or access patterns. 4. Apply principle of least privilege to PeopleSoft user accounts and services to minimize potential damage from unauthorized access. 5. Regularly review and update PeopleSoft configurations to disable unnecessary services or features that could be exploited. 6. Engage with Oracle support and subscribe to security advisories to obtain patches or workarounds as soon as they become available. 7. Consider deploying web application firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft endpoints. 8. Conduct penetration testing and vulnerability assessments focused on PeopleSoft environments to identify and remediate other potential weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-24T16:45:19.423Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e34

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 10/28/2025, 9:15:37 PM

Last updated: 10/30/2025, 2:07:19 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats