CVE-2026-34307
Unauthorized Data Modification via Workflow Vulnerability in PeopleSoft
Publication date: 2026-04-21
Last updated on: 2026-04-24
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | peoplesoft_enterprise_peopletools | 8.61 |
| oracle | peoplesoft_enterprise_peopletools | 8.62 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Workflow component of Oracle PeopleSoft Enterprise PeopleTools versions 8.61 to 8.62. It is easily exploitable by a low privileged attacker who has network access via HTTP. The attack requires human interaction from someone other than the attacker. Successful exploitation can lead to unauthorized update, insertion, or deletion of some accessible data, as well as unauthorized read access to a subset of accessible data within PeopleSoft Enterprise PeopleTools.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to compromise the integrity and confidentiality of data within PeopleSoft Enterprise PeopleTools. Specifically, an attacker could perform unauthorized updates, insertions, or deletions of data, and gain unauthorized read access to certain data. This could lead to data corruption, loss of data integrity, and exposure of sensitive information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized read and write access to some PeopleSoft Enterprise PeopleTools accessible data, which could lead to unauthorized disclosure and modification of sensitive information.
Such unauthorized access and data manipulation may impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding the confidentiality and integrity of personal and sensitive data.
However, the provided information does not explicitly state the direct impact on compliance with these standards.