Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61762: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Payables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Payables accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Payables accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Payables. in Oracle Corporation PeopleSoft Enterprise FIN Payables

0
Medium
VulnerabilityCVE-2025-61762cvecve-2025-61762
Published: Tue Oct 21 2025 (10/21/2025, 20:03:13 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise FIN Payables

Description

Vulnerability in the PeopleSoft Enterprise FIN Payables product of Oracle PeopleSoft (component: Payables). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Payables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Payables accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Payables accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Payables. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

AI-Powered Analysis

AILast updated: 10/28/2025, 22:02:44 UTC

Technical Analysis

CVE-2025-61762 is a vulnerability in Oracle PeopleSoft Enterprise FIN Payables version 9.2, specifically within the Payables component. The flaw stems from insufficient access control mechanisms (CWE-284), allowing a low privileged attacker with network access over HTTP to exploit the system. The attacker can perform unauthorized operations including reading, inserting, updating, or deleting certain accessible data within the PeopleSoft FIN Payables environment. Additionally, the vulnerability can be leveraged to cause a partial denial of service, impacting availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS 3.1 base score of 6.3 reflects low confidentiality, integrity, and availability impacts, but still significant enough to warrant attention. No patches or exploits are currently publicly available, but the vulnerability’s ease of exploitation and potential for unauthorized data manipulation pose a tangible risk. Organizations relying on PeopleSoft FIN Payables 9.2 should assess their exposure and implement compensating controls until an official patch is released.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality, integrity, and availability of financial data managed within PeopleSoft FIN Payables. Unauthorized data manipulation could lead to financial discrepancies, fraud, or compliance violations under regulations such as GDPR and SOX. Partial denial of service could disrupt financial operations, affecting business continuity and causing operational delays. Organizations in finance, government, and large enterprises using PeopleSoft 9.2 are particularly vulnerable. The ability for a low privileged attacker to exploit this remotely increases the threat surface, especially if internal network segmentation or access controls are weak. The impact extends to reputational damage and potential regulatory penalties if sensitive financial data is exposed or altered.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to PeopleSoft FIN Payables interfaces to trusted IP ranges and enforcing strict network segmentation to limit exposure. 2. Implement enhanced monitoring and logging of all access and modification attempts within PeopleSoft FIN Payables to detect suspicious activities early. 3. Apply principle of least privilege rigorously to all PeopleSoft user accounts, ensuring that users have only the minimum necessary permissions. 4. Use Web Application Firewalls (WAF) with custom rules to detect and block anomalous HTTP requests targeting PeopleSoft FIN Payables. 5. Regularly audit PeopleSoft configurations and access controls to identify and remediate misconfigurations. 6. Stay alert for Oracle’s official patch release and plan for rapid deployment. 7. Conduct internal penetration testing focusing on PeopleSoft FIN Payables to identify potential exploitation paths. 8. Educate IT and security teams about this vulnerability to improve incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.557Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97101721c03c6f13ed9

Added to database: 10/21/2025, 8:13:37 PM

Last enriched: 10/28/2025, 10:02:44 PM

Last updated: 10/29/2025, 7:03:29 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats