Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21961: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. in Oracle Corporation PeopleSoft Enterprise HCM Human Resources

0
Medium
VulnerabilityCVE-2026-21961cvecve-2026-21961
Published: Tue Jan 20 2026 (01/20/2026, 21:56:32 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: PeopleSoft Enterprise HCM Human Resources

Description

Vulnerability in the PeopleSoft Enterprise HCM Human Resources product of Oracle PeopleSoft (component: Company Dir / Org Chart Viewer, Employee Snapshot). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Human Resources. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Human Resources, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Human Resources accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Human Resources accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 01/20/2026, 22:38:04 UTC

Technical Analysis

CVE-2026-21961 is a vulnerability identified in Oracle PeopleSoft Enterprise HCM Human Resources version 9.2, specifically within components such as Company Directory / Org Chart Viewer and Employee Snapshot. The flaw allows an unauthenticated attacker with network access over HTTP to potentially compromise the system by exploiting a weakness that requires user interaction from a person other than the attacker. This interaction could be, for example, clicking a malicious link or performing an action that triggers the exploit. The vulnerability leads to unauthorized read access to a subset of data, as well as unauthorized update, insert, or delete operations on accessible PeopleSoft HCM data. The vulnerability's scope change means that although it resides in the HCM module, it may affect other integrated PeopleSoft products, amplifying the impact. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates the attack can be launched remotely over the network with low complexity, no privileges, but requires user interaction, and affects confidentiality and integrity with a scope change, but no impact on availability. No public exploits have been reported yet, but the ease of exploitation and potential data manipulation make it a significant concern for organizations relying on PeopleSoft HCM for critical HR data management.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive HR data, including employee records and organizational structures. Unauthorized data manipulation could lead to fraudulent activities, compliance violations (e.g., GDPR breaches), and operational disruptions in HR processes. The scope change suggests that other integrated Oracle PeopleSoft products could also be compromised, potentially expanding the attack surface. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the likelihood of successful attacks. The vulnerability's network accessibility and lack of required privileges make it accessible to external attackers, raising concerns about insider threats and external adversaries alike.

Mitigation Recommendations

Beyond applying Oracle's patches as soon as they become available, European organizations should implement strict network segmentation to isolate PeopleSoft HCM systems from general user networks and the internet. Deploy web application firewalls (WAFs) with rules tuned to detect and block suspicious HTTP requests targeting PeopleSoft endpoints. Conduct targeted user awareness training focusing on phishing and social engineering risks related to this vulnerability to reduce the chance of successful user interaction. Enable detailed logging and monitoring on PeopleSoft HCM systems to detect anomalous access patterns or unauthorized data changes. Employ multi-factor authentication (MFA) for accessing PeopleSoft interfaces where possible, even though the vulnerability does not require privileges, to reduce lateral movement risks. Regularly audit PeopleSoft configurations and access controls to ensure least privilege principles are enforced. Finally, coordinate with Oracle support for timely updates and advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.714Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc4b4623b1157c519fc3

Added to database: 1/20/2026, 10:06:03 PM

Last enriched: 1/20/2026, 10:38:04 PM

Last updated: 2/5/2026, 5:53:05 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats