CVE-2025-61762: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Payables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Payables accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Payables accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Payables. in Oracle Corporation PeopleSoft Enterprise FIN Payables
Vulnerability in the PeopleSoft Enterprise FIN Payables product of Oracle PeopleSoft (component: Payables). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Payables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Payables accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Payables accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Payables. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
AI Analysis
Technical Summary
CVE-2025-61762 is a vulnerability in Oracle PeopleSoft Enterprise FIN Payables version 9.2, specifically within the Payables component. The flaw stems from insufficient access control mechanisms (CWE-284), allowing a low privileged attacker with network access over HTTP to exploit the system. The attacker can perform unauthorized operations including reading, inserting, updating, or deleting certain accessible data within the PeopleSoft FIN Payables environment. Additionally, the vulnerability can be leveraged to cause a partial denial of service, impacting availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS 3.1 base score of 6.3 reflects low confidentiality, integrity, and availability impacts, but still significant enough to warrant attention. No patches or exploits are currently publicly available, but the vulnerability’s ease of exploitation and potential for unauthorized data manipulation pose a tangible risk. Organizations relying on PeopleSoft FIN Payables 9.2 should assess their exposure and implement compensating controls until an official patch is released.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality, integrity, and availability of financial data managed within PeopleSoft FIN Payables. Unauthorized data manipulation could lead to financial discrepancies, fraud, or compliance violations under regulations such as GDPR and SOX. Partial denial of service could disrupt financial operations, affecting business continuity and causing operational delays. Organizations in finance, government, and large enterprises using PeopleSoft 9.2 are particularly vulnerable. The ability for a low privileged attacker to exploit this remotely increases the threat surface, especially if internal network segmentation or access controls are weak. The impact extends to reputational damage and potential regulatory penalties if sensitive financial data is exposed or altered.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to PeopleSoft FIN Payables interfaces to trusted IP ranges and enforcing strict network segmentation to limit exposure. 2. Implement enhanced monitoring and logging of all access and modification attempts within PeopleSoft FIN Payables to detect suspicious activities early. 3. Apply principle of least privilege rigorously to all PeopleSoft user accounts, ensuring that users have only the minimum necessary permissions. 4. Use Web Application Firewalls (WAF) with custom rules to detect and block anomalous HTTP requests targeting PeopleSoft FIN Payables. 5. Regularly audit PeopleSoft configurations and access controls to identify and remediate misconfigurations. 6. Stay alert for Oracle’s official patch release and plan for rapid deployment. 7. Conduct internal penetration testing focusing on PeopleSoft FIN Payables to identify potential exploitation paths. 8. Educate IT and security teams about this vulnerability to improve incident response readiness.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-61762: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Payables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Payables accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Payables accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Payables. in Oracle Corporation PeopleSoft Enterprise FIN Payables
Description
Vulnerability in the PeopleSoft Enterprise FIN Payables product of Oracle PeopleSoft (component: Payables). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Payables. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Payables accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Payables accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise FIN Payables. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
AI-Powered Analysis
Technical Analysis
CVE-2025-61762 is a vulnerability in Oracle PeopleSoft Enterprise FIN Payables version 9.2, specifically within the Payables component. The flaw stems from insufficient access control mechanisms (CWE-284), allowing a low privileged attacker with network access over HTTP to exploit the system. The attacker can perform unauthorized operations including reading, inserting, updating, or deleting certain accessible data within the PeopleSoft FIN Payables environment. Additionally, the vulnerability can be leveraged to cause a partial denial of service, impacting availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS 3.1 base score of 6.3 reflects low confidentiality, integrity, and availability impacts, but still significant enough to warrant attention. No patches or exploits are currently publicly available, but the vulnerability’s ease of exploitation and potential for unauthorized data manipulation pose a tangible risk. Organizations relying on PeopleSoft FIN Payables 9.2 should assess their exposure and implement compensating controls until an official patch is released.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality, integrity, and availability of financial data managed within PeopleSoft FIN Payables. Unauthorized data manipulation could lead to financial discrepancies, fraud, or compliance violations under regulations such as GDPR and SOX. Partial denial of service could disrupt financial operations, affecting business continuity and causing operational delays. Organizations in finance, government, and large enterprises using PeopleSoft 9.2 are particularly vulnerable. The ability for a low privileged attacker to exploit this remotely increases the threat surface, especially if internal network segmentation or access controls are weak. The impact extends to reputational damage and potential regulatory penalties if sensitive financial data is exposed or altered.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to PeopleSoft FIN Payables interfaces to trusted IP ranges and enforcing strict network segmentation to limit exposure. 2. Implement enhanced monitoring and logging of all access and modification attempts within PeopleSoft FIN Payables to detect suspicious activities early. 3. Apply principle of least privilege rigorously to all PeopleSoft user accounts, ensuring that users have only the minimum necessary permissions. 4. Use Web Application Firewalls (WAF) with custom rules to detect and block anomalous HTTP requests targeting PeopleSoft FIN Payables. 5. Regularly audit PeopleSoft configurations and access controls to identify and remediate misconfigurations. 6. Stay alert for Oracle’s official patch release and plan for rapid deployment. 7. Conduct internal penetration testing focusing on PeopleSoft FIN Payables to identify potential exploitation paths. 8. Educate IT and security teams about this vulnerability to improve incident response readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-09-30T19:21:55.557Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7e97101721c03c6f13ed9
Added to database: 10/21/2025, 8:13:37 PM
Last enriched: 10/28/2025, 10:02:44 PM
Last updated: 10/29/2025, 7:03:29 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-7320: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in automattic WooCommerce
MediumCasdoor 2.95.0 - Cross-Site Request Forgery (CSRF)
MediumCVE-2025-9544: CWE-862 Missing Authorization in Doppler Forms
UnknownCVE-2025-49042: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Automattic WooCommerce
MediumHow to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.