CVE-2025-61750: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.61 and 8.62. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
AI Analysis
Technical Summary
CVE-2025-61750 is a vulnerability identified in Oracle's PeopleSoft Enterprise PeopleTools, specifically in the Query component of versions 8.61 and 8.62. The flaw allows an attacker with low privilege and network access via HTTP to exploit the system to gain unauthorized read access to a subset of data accessible through PeopleSoft. The vulnerability does not require user interaction and does not impact data integrity or system availability, but it compromises confidentiality to a limited extent. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity and low privileges, without user interaction, and affects confidentiality only. This vulnerability arises from insufficient access controls or improper authorization checks in the Query component, allowing attackers to bypass restrictions and read data they should not access. While no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of PeopleSoft in enterprise environments make this a significant concern. No official patches or mitigations have been linked yet, so organizations must monitor Oracle advisories closely. The vulnerability's impact is limited to unauthorized data disclosure, which could include sensitive business or personal information stored within PeopleSoft databases.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive data managed within PeopleSoft Enterprise PeopleTools. Many European enterprises, including government agencies, financial institutions, and large corporations, rely on PeopleSoft for critical HR, finance, and operational data. Unauthorized read access could lead to exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have serious consequences, especially if sensitive employee, customer, or financial information is accessed. The medium severity rating reflects the limited scope of impact but does not diminish the importance of protecting data confidentiality. Organizations with PeopleSoft versions 8.61 or 8.62 accessible over HTTP are particularly at risk. The lack of known exploits in the wild provides a window for proactive mitigation before attackers potentially develop exploit code.
Mitigation Recommendations
European organizations should immediately assess their exposure by identifying all instances of PeopleSoft Enterprise PeopleTools versions 8.61 and 8.62, especially those accessible over HTTP from untrusted networks. Network segmentation and restricting access to PeopleSoft interfaces to trusted internal networks or VPNs can reduce exposure. Implement strict firewall rules to limit HTTP access to PeopleSoft servers only to authorized personnel and systems. Monitor network traffic for unusual access patterns to PeopleSoft Query components. Since no patches are currently linked, organizations should apply Oracle's security advisories promptly once available. Additionally, review and tighten PeopleSoft user permissions to ensure least privilege principles are enforced, minimizing the impact of any compromised low-privilege accounts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious query requests targeting PeopleSoft. Regularly audit PeopleSoft logs for unauthorized access attempts. Finally, ensure that sensitive data stored in PeopleSoft is encrypted at rest and in transit to mitigate data exposure risks.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-61750: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools
Description
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.61 and 8.62. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2025-61750 is a vulnerability identified in Oracle's PeopleSoft Enterprise PeopleTools, specifically in the Query component of versions 8.61 and 8.62. The flaw allows an attacker with low privilege and network access via HTTP to exploit the system to gain unauthorized read access to a subset of data accessible through PeopleSoft. The vulnerability does not require user interaction and does not impact data integrity or system availability, but it compromises confidentiality to a limited extent. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity and low privileges, without user interaction, and affects confidentiality only. This vulnerability arises from insufficient access controls or improper authorization checks in the Query component, allowing attackers to bypass restrictions and read data they should not access. While no known exploits are currently reported in the wild, the ease of exploitation and the widespread use of PeopleSoft in enterprise environments make this a significant concern. No official patches or mitigations have been linked yet, so organizations must monitor Oracle advisories closely. The vulnerability's impact is limited to unauthorized data disclosure, which could include sensitive business or personal information stored within PeopleSoft databases.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive data managed within PeopleSoft Enterprise PeopleTools. Many European enterprises, including government agencies, financial institutions, and large corporations, rely on PeopleSoft for critical HR, finance, and operational data. Unauthorized read access could lead to exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Although the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have serious consequences, especially if sensitive employee, customer, or financial information is accessed. The medium severity rating reflects the limited scope of impact but does not diminish the importance of protecting data confidentiality. Organizations with PeopleSoft versions 8.61 or 8.62 accessible over HTTP are particularly at risk. The lack of known exploits in the wild provides a window for proactive mitigation before attackers potentially develop exploit code.
Mitigation Recommendations
European organizations should immediately assess their exposure by identifying all instances of PeopleSoft Enterprise PeopleTools versions 8.61 and 8.62, especially those accessible over HTTP from untrusted networks. Network segmentation and restricting access to PeopleSoft interfaces to trusted internal networks or VPNs can reduce exposure. Implement strict firewall rules to limit HTTP access to PeopleSoft servers only to authorized personnel and systems. Monitor network traffic for unusual access patterns to PeopleSoft Query components. Since no patches are currently linked, organizations should apply Oracle's security advisories promptly once available. Additionally, review and tighten PeopleSoft user permissions to ensure least privilege principles are enforced, minimizing the impact of any compromised low-privilege accounts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious query requests targeting PeopleSoft. Regularly audit PeopleSoft logs for unauthorized access attempts. Finally, ensure that sensitive data stored in PeopleSoft is encrypted at rest and in transit to mitigate data exposure risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-09-30T19:21:55.555Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7e96f01721c03c6f13e5c
Added to database: 10/21/2025, 8:13:35 PM
Last enriched: 10/21/2025, 8:36:42 PM
Last updated: 10/25/2025, 4:21:04 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11760: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpcenter eRoom – Webinar & Meeting Plugin for Zoom, Google Meet, Microsoft Teams
MediumCVE-2023-5379: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7
HighCVE-2025-34503: CWE-347 Improper Verification of Cryptographic Signature in Light & Wonder, Inc. / SHFL Entertainment, Inc. / Shuffle Master, Inc. Deck Mate 1
HighCVE-2025-34502: CWE-1326 Missing Immutable Root of Trust in Hardware in Light & Wonder, Inc. / SHFL Entertainment, Inc. / Shuffle Master, Inc. Deck Mate 2
HighCVE-2025-12194: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.