CVE-2026-34301
Unauthorized Access via Network in PeopleSoft Work Order Management
Publication date: 2026-04-21
Last updated on: 2026-04-24
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | peoplesoft_enterprise_fin_maintenance_management | 9.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the PeopleSoft Enterprise FIN Maintenance Management product, specifically in the Work Order Management component. It affects version 9.2 and can be exploited by a low privileged attacker who has network access via HTTP. The attacker can compromise the system, gaining unauthorized access to critical or all accessible data within PeopleSoft Enterprise FIN Maintenance Management.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker with low privileges and network access can gain unauthorized access to sensitive or critical data within the PeopleSoft Enterprise FIN Maintenance Management system. This could lead to exposure of confidential information, potentially harming the organization's data security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized access to critical data within the PeopleSoft Enterprise FIN Maintenance Management product. Such unauthorized access to sensitive or critical data can potentially lead to non-compliance with data protection regulations and standards such as GDPR and HIPAA, which require strict controls over access to personal and sensitive information.
Because the vulnerability impacts confidentiality by allowing low privileged attackers to gain unauthorized access, organizations using the affected software may face increased risk of data breaches, which could result in violations of regulatory requirements related to data privacy and security.