Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61750: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools

0
Medium
VulnerabilityCVE-2025-61750cvecve-2025-61750
Published: Tue Oct 21 2025 (10/21/2025, 20:03:08 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise PeopleTools

Description

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.61 and 8.62. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

AI-Powered Analysis

AILast updated: 10/21/2025, 20:36:42 UTC

Technical Analysis

CVE-2025-61750 is a vulnerability identified in Oracle's PeopleSoft Enterprise PeopleTools, specifically in the Query component of versions 8.61 and 8.62. The flaw allows an attacker with low privilege and network access via HTTP to exploit the system to gain unauthorized read access to a subset of data accessible through PeopleSoft. The vulnerability does not require user interaction and does not impact data integrity or system availability, but it compromises confidentiality to a limited extent. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity and low privileges, without user interaction, and affects confidentiality only. This vulnerability arises from insufficient access controls or improper authorization checks in the Query component, allowing attackers to bypass restrictions and read data they should not access. While no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of PeopleSoft in enterprise environments make this a significant concern. No official patches or mitigations have been linked yet, so organizations must monitor Oracle advisories closely. The vulnerability's impact is limited to unauthorized data disclosure, which could include sensitive business or personal information stored within PeopleSoft databases.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive data managed within PeopleSoft Enterprise PeopleTools. Many European enterprises, including government agencies, financial institutions, and large corporations, rely on PeopleSoft for critical HR, finance, and operational data. Unauthorized read access could lead to exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have serious consequences, especially if sensitive employee, customer, or financial information is accessed. The medium severity rating reflects the limited scope of impact but does not diminish the importance of protecting data confidentiality. Organizations with PeopleSoft versions 8.61 or 8.62 accessible over HTTP are particularly at risk. The lack of known exploits in the wild provides a window for proactive mitigation before attackers potentially develop exploit code.

Mitigation Recommendations

European organizations should immediately assess their exposure by identifying all instances of PeopleSoft Enterprise PeopleTools versions 8.61 and 8.62, especially those accessible over HTTP from untrusted networks. Network segmentation and restricting access to PeopleSoft interfaces to trusted internal networks or VPNs can reduce exposure. Implement strict firewall rules to limit HTTP access to PeopleSoft servers only to authorized personnel and systems. Monitor network traffic for unusual access patterns to PeopleSoft Query components. Since no patches are currently linked, organizations should apply Oracle's security advisories promptly once available. Additionally, review and tighten PeopleSoft user permissions to ensure least privilege principles are enforced, minimizing the impact of any compromised low-privilege accounts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious query requests targeting PeopleSoft. Regularly audit PeopleSoft logs for unauthorized access attempts. Finally, ensure that sensitive data stored in PeopleSoft is encrypted at rest and in transit to mitigate data exposure risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.555Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e5c

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 10/21/2025, 8:36:42 PM

Last updated: 10/25/2025, 4:21:04 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats