Advisory Published
Updated

CVE-2018-3262

First published: Wed Oct 17 2018(Updated: )

Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Stylesheet). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle Peoplesoft Enterprise Campus Software Campus Community=8.55
Oracle Peoplesoft Enterprise Campus Software Campus Community=8.56
Oracle Peoplesoft Enterprise Campus Software Campus Community=8.57

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-3262?

    CVE-2018-3262 is considered easily exploitable with high potential impact due to unauthenticated network access.

  • How do I fix CVE-2018-3262?

    The recommended fix for CVE-2018-3262 is to apply the latest patches from Oracle for PeopleSoft Enterprise PeopleTools versions 8.55, 8.56, and 8.57.

  • Who is affected by CVE-2018-3262?

    CVE-2018-3262 affects users of Oracle PeopleSoft Enterprise PeopleTools versions 8.55, 8.56, and 8.57.

  • What components are involved in CVE-2018-3262?

    CVE-2018-3262 involves a vulnerability within the Stylesheet component of the PeopleSoft Enterprise PeopleTools.

  • Can CVE-2018-3262 be exploited remotely?

    Yes, CVE-2018-3262 can be exploited remotely by an unauthenticated attacker with network access via HTTP.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203