CVE-2025-61750

4.3 MEDIUM

📋 TL;DR

This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows authenticated attackers with low privileges to read sensitive data they shouldn't have access to. It affects PeopleSoft Enterprise PeopleTools versions 8.61 and 8.62. Attackers can exploit this over HTTP to access a subset of PeopleTools data.

💻 Affected Systems

Products:
  • Oracle PeopleSoft Enterprise PeopleTools
Versions: 8.61 and 8.62
Operating Systems: All platforms running affected PeopleSoft versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Query component specifically. Requires PeopleSoft installation with Query functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive PeopleTools configuration data, user information, or business data could be exposed to unauthorized users, potentially leading to data breaches or further attacks.

🟠

Likely Case

Low-privileged users accessing data beyond their authorization level, potentially exposing internal system information or limited sensitive data.

🟢

If Mitigated

Minimal impact with proper network segmentation, strong authentication controls, and monitoring in place to detect unauthorized access attempts.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable over HTTP and affects internet-facing PeopleSoft applications, making them accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal attackers with low privileges could exploit this to escalate access or gather sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CVSS indicates 'easily exploitable' with low attack complexity. Requires authenticated access but only low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oracle Critical Patch Update for October 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2025.html

Restart Required: No

Instructions:

1. Review Oracle Critical Patch Update Advisory for October 2025. 2. Download appropriate patch for your PeopleTools version. 3. Apply patch following Oracle PeopleTools patching procedures. 4. Test in non-production environment first.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to PeopleSoft applications to only trusted IP addresses and networks

Privilege Reduction

all

Review and minimize low-privilege user access to Query functionality

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to PeopleSoft applications
  • Enhance monitoring and alerting for unusual query activity or data access patterns

🔍 How to Verify

Check if Vulnerable:

Check PeopleTools version via PeopleSoft application menu: PeopleTools > About PeopleTools

Check Version:

Not applicable - Use PeopleSoft application interface to check version

Verify Fix Applied:

Verify patch application via PeopleTools patch history and confirm version is no longer 8.61 or 8.62

📡 Detection & Monitoring

Log Indicators:

  • Unusual query activity from low-privilege users
  • Multiple failed query attempts followed by successful data access

Network Indicators:

  • HTTP requests to Query endpoints from unexpected sources
  • Patterns of data extraction via web services

SIEM Query:

source="peoplesoft" AND (event_type="query_execution" OR uri="/psc/query*") AND user_privilege="low" AND data_size>threshold

🔗 References

📤 Share & Export