CVE-2026-21961: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. in Oracle Corporation PeopleSoft Enterprise HCM Human Resources
Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Company Dir / Org Chart Viewer, Employee Snapshot). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2026-21961 is a vulnerability identified in Oracle PeopleSoft Enterprise HCM Human Resources version 9.2, specifically within components such as Company Directory / Org Chart Viewer and Employee Snapshot. The flaw allows an unauthenticated attacker with network access over HTTP to potentially compromise the system by exploiting a weakness that requires user interaction from a person other than the attacker. This interaction could be, for example, clicking a malicious link or performing an action that triggers the exploit. The vulnerability leads to unauthorized read access to a subset of data, as well as unauthorized update, insert, or delete operations on accessible PeopleSoft HCM data. The vulnerability's scope change means that although it resides in the HCM module, it may affect other integrated PeopleSoft products, amplifying the impact. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates the attack can be launched remotely over the network with low complexity, no privileges, but requires user interaction, and affects confidentiality and integrity with a scope change, but no impact on availability. No public exploits have been reported yet, but the ease of exploitation and potential data manipulation make it a significant concern for organizations relying on PeopleSoft HCM for critical HR data management.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive HR data, including employee records and organizational structures. Unauthorized data manipulation could lead to fraudulent activities, compliance violations (e.g., GDPR breaches), and operational disruptions in HR processes. The scope change suggests that other integrated Oracle PeopleSoft products could also be compromised, potentially expanding the attack surface. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the likelihood of successful attacks. The vulnerability's network accessibility and lack of required privileges make it accessible to external attackers, raising concerns about insider threats and external adversaries alike.
Mitigation Recommendations
Beyond applying Oracle's patches as soon as they become available, European organizations should implement strict network segmentation to isolate PeopleSoft HCM systems from general user networks and the internet. Deploy web application firewalls (WAFs) with rules tuned to detect and block suspicious HTTP requests targeting PeopleSoft endpoints. Conduct targeted user awareness training focusing on phishing and social engineering risks related to this vulnerability to reduce the chance of successful user interaction. Enable detailed logging and monitoring on PeopleSoft HCM systems to detect anomalous access patterns or unauthorized data changes. Employ multi-factor authentication (MFA) for accessing PeopleSoft interfaces where possible, even though the vulnerability does not require privileges, to reduce lateral movement risks. Regularly audit PeopleSoft configurations and access controls to ensure least privilege principles are enforced. Finally, coordinate with Oracle support for timely updates and advisories.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2026-21961: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. in Oracle Corporation PeopleSoft Enterprise HCM Human Resources
Description
Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Company Dir / Org Chart Viewer, Employee Snapshot). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2026-21961 is a vulnerability identified in Oracle PeopleSoft Enterprise HCM Human Resources version 9.2, specifically within components such as Company Directory / Org Chart Viewer and Employee Snapshot. The flaw allows an unauthenticated attacker with network access over HTTP to potentially compromise the system by exploiting a weakness that requires user interaction from a person other than the attacker. This interaction could be, for example, clicking a malicious link or performing an action that triggers the exploit. The vulnerability leads to unauthorized read access to a subset of data, as well as unauthorized update, insert, or delete operations on accessible PeopleSoft HCM data. The vulnerability's scope change means that although it resides in the HCM module, it may affect other integrated PeopleSoft products, amplifying the impact. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates the attack can be launched remotely over the network with low complexity, no privileges, but requires user interaction, and affects confidentiality and integrity with a scope change, but no impact on availability. No public exploits have been reported yet, but the ease of exploitation and potential data manipulation make it a significant concern for organizations relying on PeopleSoft HCM for critical HR data management.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive HR data, including employee records and organizational structures. Unauthorized data manipulation could lead to fraudulent activities, compliance violations (e.g., GDPR breaches), and operational disruptions in HR processes. The scope change suggests that other integrated Oracle PeopleSoft products could also be compromised, potentially expanding the attack surface. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the likelihood of successful attacks. The vulnerability's network accessibility and lack of required privileges make it accessible to external attackers, raising concerns about insider threats and external adversaries alike.
Mitigation Recommendations
Beyond applying Oracle's patches as soon as they become available, European organizations should implement strict network segmentation to isolate PeopleSoft HCM systems from general user networks and the internet. Deploy web application firewalls (WAFs) with rules tuned to detect and block suspicious HTTP requests targeting PeopleSoft endpoints. Conduct targeted user awareness training focusing on phishing and social engineering risks related to this vulnerability to reduce the chance of successful user interaction. Enable detailed logging and monitoring on PeopleSoft HCM systems to detect anomalous access patterns or unauthorized data changes. Employ multi-factor authentication (MFA) for accessing PeopleSoft interfaces where possible, even though the vulnerability does not require privileges, to reduce lateral movement risks. Regularly audit PeopleSoft configurations and access controls to ensure least privilege principles are enforced. Finally, coordinate with Oracle support for timely updates and advisories.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2026-01-05T18:07:34.714Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696ffc4b4623b1157c519fc3
Added to database: 1/20/2026, 10:06:03 PM
Last enriched: 1/20/2026, 10:38:04 PM
Last updated: 2/5/2026, 5:53:05 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0715: CWE-522: Insufficiently Protected Credentials in Moxa UC-1200A Series
HighCVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series
HighCVE-2025-70792: n/a
HighCVE-2025-70791: n/a
HighCVE-2025-69906: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.