CVE-2026-21971
📋 TL;DR
This vulnerability in Oracle PeopleSoft Enterprise SCM Purchasing allows authenticated attackers with low privileges to modify or delete some purchasing data and read limited information via HTTP requests. It affects PeopleSoft Enterprise SCM Purchasing version 9.2, potentially impacting organizations using this procurement system.
💻 Affected Systems
- Oracle PeopleSoft Enterprise SCM Purchasing
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could manipulate purchasing data, create fraudulent orders, modify vendor information, or exfiltrate sensitive procurement data, potentially leading to financial loss or supply chain disruption.
Likely Case
Low-privileged users or compromised accounts could modify purchase orders, change vendor details, or access restricted purchasing information they shouldn't see.
If Mitigated
With proper access controls and network segmentation, impact would be limited to authorized users making unauthorized changes within their assigned business units.
🎯 Exploit Status
Requires authenticated access but only low privileges. Attack vector is straightforward via HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Oracle Critical Patch Update for January 2026
Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2026.html
Restart Required: Yes
Instructions:
1. Download the appropriate patch from Oracle Support. 2. Apply the patch following Oracle PeopleSoft patching procedures. 3. Restart the PeopleSoft application server. 4. Test purchasing functionality.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict HTTP access to PeopleSoft Purchasing application to only authorized users and networks
Privilege Reduction
allReview and reduce user privileges in PeopleSoft Purchasing to minimum required levels
🧯 If You Can't Patch
- Implement strict network segmentation to isolate PeopleSoft Purchasing from untrusted networks
- Enhance monitoring of purchasing data modifications and implement approval workflows for critical changes
🔍 How to Verify
Check if Vulnerable:
Check PeopleTools version and verify if running PeopleSoft Enterprise SCM Purchasing 9.2 without the January 2026 Oracle patch
Check Version:
Check PeopleTools version in PeopleSoft application or via PSADMIN utility
Verify Fix Applied:
Verify patch application through PeopleSoft Change Assistant and confirm version in Oracle documentation
📡 Detection & Monitoring
Log Indicators:
- Unusual pattern of purchasing data modifications
- Multiple failed authorization attempts followed by successful purchasing transactions
- User accounts accessing purchasing functions outside normal business hours
Network Indicators:
- HTTP requests to purchasing endpoints from unusual IP addresses
- Burst of purchasing-related API calls
SIEM Query:
source="peoplesoft" AND (event_type="purchase_modify" OR event_type="vendor_update") AND user_privilege="low" AND result="success"