CVE-2026-22019
Unauthorized Data Modification via Person Search in PeopleSoft HCM
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | peoplesoft_enterprise_hcm_shared_components | 9.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the PeopleSoft Enterprise HCM Shared Components product of Oracle PeopleSoft, specifically in the Person Search component. It is an easily exploitable flaw that allows a low privileged attacker with network access via HTTP to compromise the system. Successful exploitation requires human interaction from someone other than the attacker. The vulnerability can lead to unauthorized update, insertion, or deletion of some accessible data, as well as unauthorized read access to a subset of accessible data within the PeopleSoft Enterprise HCM Shared Components.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized modification (update, insert, delete) and unauthorized reading of certain data within the PeopleSoft Enterprise HCM Shared Components. This means an attacker could alter or view sensitive information they should not have access to. Additionally, because the scope of the attack can extend beyond the initial component, other related products may also be significantly affected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized read and modification access to certain data within PeopleSoft Enterprise HCM Shared Components. Such unauthorized access and data manipulation could potentially lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data to ensure confidentiality and integrity.
However, the provided information does not explicitly mention the impact on compliance with specific standards or regulations.