CVE-2026-21971: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. in Oracle Corporation PeopleSoft Enterprise SCM Purchasing
Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Purchasing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2026-21971 is a vulnerability identified in Oracle PeopleSoft Enterprise SCM Purchasing version 9.2, specifically within the Purchasing component. The flaw allows an attacker with low privileges and network access over HTTP to compromise the application by performing unauthorized data operations including update, insert, delete, and read on a subset of accessible data. The vulnerability does not require user interaction but does require the attacker to have some level of privileges (PR:L), indicating that the attacker must already have limited authenticated access or a low privilege user account. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), making exploitation relatively straightforward once access is gained. The CVSS 3.1 base score of 5.4 reflects moderate impact primarily on confidentiality and integrity, with no impact on availability. This vulnerability could lead to unauthorized data manipulation or disclosure within the supply chain management system, potentially affecting business operations and data integrity. No public exploits or active exploitation have been reported yet, but the ease of exploitation and the critical nature of SCM data make this a significant risk. The lack of a patch link suggests that a vendor fix may be pending or must be obtained through Oracle support channels. Organizations using PeopleSoft SCM Purchasing 9.2 should monitor for updates and prepare to apply patches promptly. Additional mitigations include restricting HTTP access to trusted networks, enforcing strict user privilege management, and monitoring for unusual activity within the application.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of supply chain data managed through PeopleSoft SCM Purchasing. Unauthorized data manipulation could disrupt procurement processes, cause financial discrepancies, or lead to compliance violations, especially in regulated industries such as manufacturing, automotive, pharmaceuticals, and retail. Data disclosure could expose sensitive supplier or contract information, impacting competitive advantage and privacy obligations under GDPR. The medium severity score reflects that while availability is not impacted, the integrity and confidentiality breaches could have significant operational and reputational consequences. Given the interconnected nature of supply chains, exploitation could cascade to affect partners and customers. Organizations relying heavily on PeopleSoft SCM Purchasing for critical procurement functions must consider this vulnerability a priority to avoid potential business disruption and regulatory penalties.
Mitigation Recommendations
1. Apply official Oracle patches immediately once available to remediate the vulnerability. 2. Restrict network access to PeopleSoft SCM Purchasing interfaces by implementing network segmentation and firewall rules limiting HTTP access to trusted internal IPs only. 3. Enforce the principle of least privilege for all user accounts within PeopleSoft, ensuring that users have only the minimum necessary permissions to perform their roles. 4. Implement multi-factor authentication (MFA) for all access to PeopleSoft systems to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Monitor application logs and network traffic for unusual activities such as unexpected data modifications or access patterns. 6. Conduct regular security assessments and penetration tests focused on PeopleSoft environments to identify and remediate potential weaknesses. 7. Educate users and administrators about this vulnerability and the importance of secure credential management. 8. Maintain an incident response plan tailored to PeopleSoft environments to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2026-21971: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. in Oracle Corporation PeopleSoft Enterprise SCM Purchasing
Description
Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Purchasing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2026-21971 is a vulnerability identified in Oracle PeopleSoft Enterprise SCM Purchasing version 9.2, specifically within the Purchasing component. The flaw allows an attacker with low privileges and network access over HTTP to compromise the application by performing unauthorized data operations including update, insert, delete, and read on a subset of accessible data. The vulnerability does not require user interaction but does require the attacker to have some level of privileges (PR:L), indicating that the attacker must already have limited authenticated access or a low privilege user account. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), making exploitation relatively straightforward once access is gained. The CVSS 3.1 base score of 5.4 reflects moderate impact primarily on confidentiality and integrity, with no impact on availability. This vulnerability could lead to unauthorized data manipulation or disclosure within the supply chain management system, potentially affecting business operations and data integrity. No public exploits or active exploitation have been reported yet, but the ease of exploitation and the critical nature of SCM data make this a significant risk. The lack of a patch link suggests that a vendor fix may be pending or must be obtained through Oracle support channels. Organizations using PeopleSoft SCM Purchasing 9.2 should monitor for updates and prepare to apply patches promptly. Additional mitigations include restricting HTTP access to trusted networks, enforcing strict user privilege management, and monitoring for unusual activity within the application.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of supply chain data managed through PeopleSoft SCM Purchasing. Unauthorized data manipulation could disrupt procurement processes, cause financial discrepancies, or lead to compliance violations, especially in regulated industries such as manufacturing, automotive, pharmaceuticals, and retail. Data disclosure could expose sensitive supplier or contract information, impacting competitive advantage and privacy obligations under GDPR. The medium severity score reflects that while availability is not impacted, the integrity and confidentiality breaches could have significant operational and reputational consequences. Given the interconnected nature of supply chains, exploitation could cascade to affect partners and customers. Organizations relying heavily on PeopleSoft SCM Purchasing for critical procurement functions must consider this vulnerability a priority to avoid potential business disruption and regulatory penalties.
Mitigation Recommendations
1. Apply official Oracle patches immediately once available to remediate the vulnerability. 2. Restrict network access to PeopleSoft SCM Purchasing interfaces by implementing network segmentation and firewall rules limiting HTTP access to trusted internal IPs only. 3. Enforce the principle of least privilege for all user accounts within PeopleSoft, ensuring that users have only the minimum necessary permissions to perform their roles. 4. Implement multi-factor authentication (MFA) for all access to PeopleSoft systems to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Monitor application logs and network traffic for unusual activities such as unexpected data modifications or access patterns. 6. Conduct regular security assessments and penetration tests focused on PeopleSoft environments to identify and remediate potential weaknesses. 7. Educate users and administrators about this vulnerability and the importance of secure credential management. 8. Maintain an incident response plan tailored to PeopleSoft environments to quickly address any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2026-01-05T18:07:34.715Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696ffc4c4623b1157c519feb
Added to database: 1/20/2026, 10:06:04 PM
Last enriched: 1/20/2026, 10:25:03 PM
Last updated: 2/5/2026, 6:12:32 PM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
UnknownCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
UnknownCVE-2025-47911: CWE-400: Uncontrolled Resource Consumption in golang.org/x/net golang.org/x/net/html
UnknownCVE-2025-15557: CWE-295 Improper Certificate Validation in TP-Link Systems Inc. Tapo H100 v1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.