Unauthenticated web attack allows read on Oracle PeopleSoft 8.60-8.62 (PIA Core)
CVE-2025-30747 Published on July 15, 2025
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
Vulnerability Analysis
CVE-2025-30747 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
What is an AuthZ Vulnerability?
The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
CVE-2025-30747 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2025-30747
stack.watch emails you whenever new vulnerabilities are published in Oracle or Oracle Peoplesoft Enterprise Peopletools. Just hit a watch button to start following.
Affected Versions
Oracle Corporation PeopleSoft Enterprise PeopleTools:- Version 8.60 is affected.
- Version 8.61 is affected.
- Version 8.62 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.