Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21951: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. in Oracle Corporation PeopleSoft Enterprise PeopleTools

0
Medium
VulnerabilityCVE-2026-21951cvecve-2026-21951
Published: Tue Jan 20 2026 (01/20/2026, 21:56:29 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise PeopleTools

Description

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Integration Broker). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 01/20/2026, 22:38:57 UTC

Technical Analysis

CVE-2026-21951 is a vulnerability in Oracle PeopleSoft Enterprise PeopleTools, specifically within the Integration Broker component, affecting versions 8.60, 8.61, and 8.62. The flaw allows an unauthenticated attacker with network access via HTTP to exploit the system, but requires user interaction from a third party (UI:R) to succeed. The vulnerability results in a scope change (S:C), meaning that although the initial compromise is within PeopleTools, it can impact additional products integrated with PeopleSoft. Successful exploitation can lead to unauthorized read access (confidentiality impact) and unauthorized update, insert, or delete operations (integrity impact) on PeopleSoft accessible data. The CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, low confidentiality and integrity impact, and no availability impact. This vulnerability is easily exploitable due to low complexity and no authentication needed, but the requirement for user interaction reduces the attack likelihood somewhat. No public exploits or patches have been reported at the time of publication, increasing the urgency for organizations to monitor and prepare mitigations. The Integration Broker is a critical component for PeopleSoft’s messaging and integration capabilities, so compromise here can cascade to other connected systems, amplifying the risk.

Potential Impact

For European organizations, the impact of CVE-2026-21951 can be significant, especially for those relying on Oracle PeopleSoft Enterprise PeopleTools for enterprise resource planning (ERP), human capital management (HCM), or financial management. Unauthorized data manipulation (update, insert, delete) can lead to financial fraud, data corruption, or operational disruptions. Unauthorized read access may expose sensitive employee, customer, or financial data, raising compliance issues under GDPR and other data protection regulations. The scope change means that other integrated Oracle products or third-party systems connected via the Integration Broker could also be compromised, potentially expanding the attack surface and impact. The requirement for user interaction suggests phishing or social engineering could be used to trigger the exploit, which is a common attack vector in enterprise environments. The lack of availability impact reduces the risk of denial-of-service but does not mitigate the risks to confidentiality and integrity. Organizations in regulated sectors such as finance, healthcare, and government are particularly vulnerable due to the sensitivity of data and regulatory scrutiny.

Mitigation Recommendations

1. Apply patches or updates from Oracle as soon as they become available for PeopleSoft Enterprise PeopleTools versions 8.60, 8.61, and 8.62. 2. Restrict network access to the Integration Broker component by implementing network segmentation and firewall rules to limit HTTP access only to trusted sources. 3. Implement strict monitoring and logging of Integration Broker traffic and PeopleSoft database changes to detect anomalous activity indicative of exploitation attempts. 4. Conduct targeted user awareness training focused on social engineering and phishing risks, emphasizing the need to verify unexpected requests or interactions related to PeopleSoft systems. 5. Employ multi-factor authentication (MFA) for administrative and user access to PeopleSoft environments to reduce the risk of credential misuse. 6. Review and harden PeopleSoft configuration settings to minimize exposure of sensitive data and reduce privileges granted to integration components. 7. Develop and test incident response plans specific to PeopleSoft compromise scenarios to enable rapid containment and remediation. 8. Engage with Oracle support and threat intelligence sources to stay informed about emerging exploits or additional mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.712Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc4a4623b1157c519f9b

Added to database: 1/20/2026, 10:06:02 PM

Last enriched: 1/20/2026, 10:38:57 PM

Last updated: 2/6/2026, 12:30:36 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats