Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21934: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools

0
Medium
VulnerabilityCVE-2026-21934cvecve-2026-21934
Published: Tue Jan 20 2026 (01/20/2026, 21:56:24 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise PeopleTools

Description

CVE-2026-21934 is a medium severity vulnerability in Oracle PeopleSoft Enterprise PeopleTools versions 8. 60, 8. 61, and 8. 62, specifically affecting the Push Notifications component. It allows a low privileged attacker with network access via HTTP to perform unauthorized read, update, insert, or delete operations on accessible PeopleSoft data. Exploitation does not require user interaction but does require some level of privilege (PR:L). The CVSS 3. 1 base score is 5. 4, reflecting limited confidentiality and integrity impacts without affecting availability. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:20:15 UTC

Technical Analysis

CVE-2026-21934 is a vulnerability identified in Oracle's PeopleSoft Enterprise PeopleTools, versions 8.60 through 8.62, specifically within the Push Notifications component. This flaw allows an attacker with low privileges and network access over HTTP to compromise the system by gaining unauthorized capabilities to read, update, insert, or delete certain accessible data within PeopleSoft. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and no user interaction (UI:N), but it does require the attacker to have some level of privileges (PR:L). The vulnerability impacts confidentiality and integrity but does not affect availability, as reflected in the CVSS 3.1 score of 5.4. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component without affecting other system components. The vulnerability arises from insufficient access control or improper validation in the Push Notifications feature, allowing unauthorized data manipulation and disclosure. Although no known exploits are currently reported, the ease of exploitation and the nature of the affected data pose a significant risk to organizations relying on PeopleSoft for enterprise resource planning and business-critical operations. The lack of a published patch link suggests that organizations should monitor Oracle advisories closely and consider compensating controls in the interim.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure and manipulation of sensitive enterprise data managed within PeopleSoft systems, including HR, finance, and supply chain information. The ability to insert, update, or delete data without proper authorization can disrupt business processes, cause data integrity issues, and potentially lead to regulatory non-compliance under GDPR due to unauthorized data access. Organizations in sectors such as government, finance, manufacturing, and large enterprises that rely heavily on PeopleSoft for critical operations are at heightened risk. The network-based attack vector means that exposed PeopleSoft services accessible over HTTP are particularly vulnerable, increasing the attack surface. Although the vulnerability does not affect availability, the integrity and confidentiality impacts can cause operational disruptions and reputational damage. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation, especially given the medium complexity and low privilege requirements.

Mitigation Recommendations

European organizations should immediately identify and inventory all PeopleSoft Enterprise PeopleTools instances running versions 8.60, 8.61, or 8.62, focusing on those exposing the Push Notifications component over HTTP. Apply Oracle's security patches as soon as they become available; until then, restrict network access to PeopleSoft services using firewalls and network segmentation to limit exposure to trusted internal networks only. Implement strict access controls and monitor for unusual activity related to PeopleSoft data modifications. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting PeopleSoft endpoints. Conduct regular audits of PeopleSoft user privileges to ensure least privilege principles are enforced, minimizing the risk posed by compromised low-privilege accounts. Additionally, enable logging and alerting on data access and modification events within PeopleSoft to facilitate rapid detection and response. Consider encrypting sensitive data at rest and in transit to reduce the impact of unauthorized data access. Finally, educate IT and security teams about this vulnerability and incorporate it into incident response plans.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc494623b1157c519f5e

Added to database: 1/20/2026, 10:06:01 PM

Last enriched: 1/28/2026, 8:20:15 PM

Last updated: 2/7/2026, 6:52:48 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats