IBM
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any IBM product.
RSS Feeds for IBM security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in IBM products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by IBM Sorted by Most Security Vulnerabilities since 2018
Known Exploited IBM Vulnerabilities
The following IBM vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| IBM Aspera Faspex Code Execution Vulnerability |
IBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw. CVE-2022-47986 Exploit Probability: 94.3% |
February 21, 2023 |
| IBM InfoSphere BigInsights Invalid Input Vulnerability |
Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data. CVE-2013-3993 Exploit Probability: 21.0% |
May 25, 2022 |
| IBM WebSphere Application Server and Server Hypervisor Edition Code Injection. |
Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands CVE-2015-7450 Exploit Probability: 93.5% |
January 10, 2022 |
| IBM Data Risk Manager Arbritary File Download |
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to download arbitrary files from the system. IBM X-Force ID: 180535. CVE-2020-4430 Exploit Probability: 83.8% |
November 3, 2021 |
| IBM Data Risk Manager Authentication Bypass |
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532. CVE-2020-4427 Exploit Probability: 92.7% |
November 3, 2021 |
| IBM Data Risk Manager Command Injection |
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, and 2.0.4 could allow a remote authenticated attacker to execute arbitrary commands on the system. IBM X-Force ID: 180533. CVE-2020-4428 Exploit Probability: 92.3% |
November 3, 2021 |
| IBM Planning Analytics configuration overwrite vulnerability |
IBM Planning Analytics 2.0.0 through 2.0.8 is vulnerable to a configuration overwrite that allows an unauthenticated user to login as "admin", and then execute code as root or SYSTEM via TM1 scripting. IBM X-Force ID: 172094. CVE-2019-4716 Exploit Probability: 93.4% |
November 3, 2021 |
Of the known exploited vulnerabilities above, 6 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings. The vulnerability CVE-2013-3993: IBM InfoSphere BigInsights Invalid Input Vulnerability is in the top 5% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 163 vulnerabilities in IBM with an average score of 5.8 out of ten. Last year, in 2025 IBM had 563 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in IBM in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.46
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 163 | 5.80 |
| 2025 | 563 | 6.26 |
| 2024 | 503 | 6.44 |
| 2023 | 357 | 6.80 |
| 2022 | 327 | 6.36 |
| 2021 | 443 | 6.10 |
| 2020 | 353 | 6.19 |
| 2019 | 454 | 6.14 |
| 2018 | 451 | 6.24 |
It may take a day or so for new IBM vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent IBM Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-36187 | Mar 25, 2026 |
IBM Knowledge Catalog Logs Sensitive Data to Local Privileged User (5.0.0-5.2.1)IBM Knowledge Catalog Standard Cartridge 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1, 5,1.2, 5.1.3, 5.2.0, 5.2.1 stores potentially sensitive information in log files that could be read by a local privileged user. |
|
| CVE-2025-14684 | Mar 25, 2026 |
IBM Maximo Monitor Log Injection 8.10-9.1 (CVE-2025-14684)IBM Maximo Application Suite - Monitor Component 9.1, 9.0, 8.11, and 8.10 could allow an unauthorized user to inject data into log messages due to improper neutralization of special elements when written to log files. |
|
| CVE-2025-14807 | Mar 25, 2026 |
IBM InfoSphere Information Server 11.7.x Host Header InjectionIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. |
|
| CVE-2026-1015 | Mar 25, 2026 |
IBM InfoSphere InfoServer 11.7.x SSRF via Outbound RequestsIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. |
|
| CVE-2026-1014 | Mar 25, 2026 |
IBM InfoSphere IS 11.7 JSON Response Info LeakageIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to exposure of sensitive information via JSON server response manipulation. |
|
| CVE-2026-2483 | Mar 25, 2026 |
IBM InfoSphere InfoServer XSS via Web UI Before 11.7.1.6 (CVE20262483)IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session |
|
| CVE-2025-64648 | Mar 25, 2026 |
IBM Concert 1.0.0-2.2.0 Transmits Data in Clear Text (MITM Risk)IBM Concert 1.0.0 through 2.2.0 transmits data in clear text that could allow an attacker to obtain sensitive information using man in the middle techniques. |
|
| CVE-2025-64647 | Mar 25, 2026 |
IBM Concert 1.0.0-2.2.0 Crypto Weakness: Decrypt Sensitive DataIBM Concert 1.0.0 through 2.2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information |
|
| CVE-2026-2484 | Mar 25, 2026 |
IBM InfoSphere InfoServer 11.7.x Info Exposure via Verbose ErrorsIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an information exposure vulnerability caused by overly verbose error messages |
|
| CVE-2025-64646 | Mar 25, 2026 |
IBM Concert 1.0-2.2 Buffer Clear Bypass (CVE-2025-64646)IBM Concert 1.0.0 through 2.2.0 could allow an attacker to access sensitive information in memory due to the buffer not properly clearing resources. |
|
| CVE-2025-36440 | Mar 25, 2026 |
IBM Concert 1.02.2: Local Data Leak via Missing FLACIBM Concert 1.0.0 through 2.2.0 could allow a local user to obtain sensitive information due to missing function level access control. |
|
| CVE-2025-36438 | Mar 25, 2026 |
IBM Concert 2.2.0 Privileged User Channel Misrestriction VulnerabilityIBM Concert 1.0.0 through 2.2.0 could allow a privileged user to perform unauthorized actions due to improper restriction of channel communication to intended endpoints. |
|
| CVE-2025-36422 | Mar 25, 2026 |
CSRF in IBM InfoSphere DataStage Flow Designer v11.7.0.011.7.1.6IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 IBM InfoSphere DataStage Flow Designer is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. |
|
| CVE-2025-36258 | Mar 25, 2026 |
IBM InfoSphere IS 11.7.x Plain-Text Credential Storage Local Privilege EscalationIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 product stores user credentials and other sensitive information in plain text which can be read by a local user. |
|
| CVE-2026-2485 | Mar 25, 2026 |
Infosphere IS 11.7.x Web UI XSS (stored) - Arbitrary JS execIBM Infosphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
|
| CVE-2025-14974 | Mar 25, 2026 |
IDOR in IBM InfoSphere Information Server < 11.7.1.7IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable due to Insecure Direct Object Reference (IDOR). |
|
| CVE-2026-1262 | Mar 25, 2026 |
IBM InfoSphere Info Server 11.7 Info Disclosure (CVE-2026-1262)IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an information disclosure vulnerability. |
|
| CVE-2025-14917 | Mar 25, 2026 |
IBM WebSphere App Server Liberty 17.0.0.3-26.0.0.3 Admin Security WeaknessIBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty could provide weaker than expected security when administering security settings. |
|
| CVE-2025-14912 | Mar 25, 2026 |
SSRF in IBM InfoSphere Info Server 11.7.0.0-11.7.1.6IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. |
|
| CVE-2025-14915 | Mar 25, 2026 |
Privilege Escalation in IBM WebSphere AppSrv Liberty 17.0.0.3-26.0.0.3IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is affected by privilege escalation. A privileged user could gain additional access to the application server. |
|
| CVE-2025-14810 | Mar 25, 2026 |
IBM InfoSphere Info Server 11.7.0.0-11.7.1.6: Session Expiration LapseIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 does not invalidate a session after privileges have been modified which could allow an authenticated user to retain access to sensitive information. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE: CWE-613: Insufficient Session Expiration CVSS Source: IBM CVSS Base score: 6.3 CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) |
|
| CVE-2026-1561 | Mar 25, 2026 |
SSRF in IBM WebSphere Application Server Liberty 17.0.0.3-26.0.0.3IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is vulnerable to server-side request forgery (SSRF). This may allow remote attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. |
|
| CVE-2025-14808 | Mar 25, 2026 |
IBM InfoSphere IS v11.7.0.0-11.7.1.6 Info Leak via HTTP GET QueryIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques. |
|
| CVE-2025-14790 | Mar 25, 2026 |
IBM InfoSphere Info Server 11.7.*: Unprotected credentials expose sensitive dataIBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information due to insufficiently protected credentials. |
|
| CVE-2025-12708 | Mar 25, 2026 |
IBM Concert 1.0.0-2.2.0 Hardc Creds Local User AccessIBM Concert 1.0.0 through 2.2.0 contains hard-coded credentials that could be obtained by a local user. |
|
| CVE-2025-36051 | Mar 19, 2026 |
IBM QRadar SIEM 7.5.0-14 Local User Info Disclosure in config filesIBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 stores potentially sensitive information in configuration files that could be read by a local user. |
|
| CVE-2025-13995 | Mar 19, 2026 |
IBM QRadar SIEM 7.5.0 UpdatePkg14 Cross-Tenant Hostname Data LeakIBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 could allow an attacker with access to one tenant to access hostname data from another tenant's account. |
|
| CVE-2025-15051 | Mar 19, 2026 |
CVE-2025-15051 IBM QRadar SIEM 7.5.0 XSS in Web UIIBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality. |
|
| CVE-2026-1276 | Mar 19, 2026 |
IBM QRadar SIEM XSS in Web UI 7.5.0 Update 14IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
|
| CVE-2026-1264 | Mar 17, 2026 |
IBM Sterling B2B/FG 6.x Remote Deletion of CommunitiesIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 allows a remote unauthenticated attacker to view and delete the partners of a community and to delete the communities. |
|
| CVE-2025-14031 | Mar 17, 2026 |
Crash in IBM Sterling B2B Integrator/File Gateway 6.1.0.06.2.2.0 via Unauth ReqIBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes the application to crash. |
|
| CVE-2026-3856 | Mar 17, 2026 |
IBM Db2 Recovery Expert 5.5 IF 2 insecure data integrity verificationIBM Db2 Recovery Expert for Linux, UNIX and Windows 5.5 IF 2 could allow an attacker to modify or corrupt data due to an insecure mechanism used for verifying the integrity of the data during transmission. |
|
| CVE-2026-1376 | Mar 17, 2026 |
IBM i 7.6 DoS via Auth Failure & Resource LeakIBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources. |
|
| CVE-2026-1267 | Mar 17, 2026 |
IBM Planning Analytics Local 2.1.0-17 Unauthorized Access (No ACL)IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an unauthorized access to sensitive application data and administrative functionalities due to lack of proper access controls. |
|
| CVE-2025-14806 | Mar 17, 2026 |
IBM Planning Analytics Local 2.1.0-2.1.17 Improper Cache DisclosureIBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an attacker to trick the caching mechanism into storing and serving sensitive, user-specific responses as publicly cacheable resources. |
|
| CVE-2026-0977 | Mar 13, 2026 |
IBM CICS TG Multi 9.3/10.1 Access Control Flaw Enables File Transfer/ViewIBM CICS Transaction Gateway for Multiplatforms 9.3 and 10.1 could allow a user to transfer or view files due to improper access controls. |
|
| CVE-2025-13212 | Mar 13, 2026 |
IBM Aspera Console 3.3.0-3.4.8 Authenticated Email Service DoSIBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated user to cause a denial of service in the email service due to improper control of interaction frequency. |
|
| CVE-2025-13459 | Mar 13, 2026 |
IBM Aspera Console 3.3.0-3.4.8 Privileged DoS via Workflow EnforcementIBM Aspera Console 3.3.0 through 3.4.8 could allow a privileged user to cause a denial of service due to improper enforcement of behavioral workflow. |
|
| CVE-2025-13460 | Mar 13, 2026 |
IBM Aspera Console 3.3.0-3.4.8 Username Enum via Response DiscrepancyIBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate usernames due to an observable response discrepancy. |
|
| CVE-2025-36368 | Mar 13, 2026 |
IBM Sterling B2B File GW 6.x6.2.1.1_1 SQLiIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, and 6.2.1.0 through 6.2.1.1_1 are vulnerable to SQL injection. An administrative user could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. |
|
| CVE-2023-40693 | Mar 13, 2026 |
IBM Sterling B2B Intgr/SG 6.x: Web UI XSSIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, and 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
|
| CVE-2025-14483 | Mar 13, 2026 |
IBM Sterling B2B/File Gateway 6.x Info Disclosure to Authenticated UsersIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could disclose sensitive host information to authenticated users in responses that could be used in further attacks against the system. |
|
| CVE-2025-14504 | Mar 13, 2026 |
CVE-2025-14504 IBM Sterling B2B Integrator/XG XSS in Web UI (6.1.06.2.2.0)IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
|
| CVE-2026-0835 | Mar 13, 2026 |
XSS in IBM Sterling B2B Integrator 6.1-6.2.2: UI code injectionIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 are vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
|
| CVE-2025-13702 | Mar 13, 2026 |
IBM SPM XSS Vulnerability in 6.2.3.0-6.2.4.2 Authenticated JS InjectionIBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
|
| CVE-2025-13718 | Mar 13, 2026 |
IBM Sterling PEngMgr 6.2.3.x-6.2.4.2 Cleartext Leak via Unencrypted CommIBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information in cleartext in a communication channel that can be sniffed by unauthorized actors. |
|
| CVE-2025-13723 | Mar 13, 2026 |
IBM Sterling Partner Eng Manager: Data Leak via Expired Token (6.2.4.2)IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive user information using an expired access token |
|
| CVE-2025-13726 | Mar 13, 2026 |
IBM Sterling Partner Engagement Mgmt 6.2.3.0-6.2.4.2 RCE via Error DisclosureIBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information when detailed technical error messages are returned. This information could be used in further attacks against the system. |
|
| CVE-2025-14811 | Mar 13, 2026 |
IBM Sterling PME 6.2.3/6.2.4 Sensitive Data Leakage via HTTP GET QueryIBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques. |
|
| CVE-2025-13213 | Mar 10, 2026 |
IBM Aspera Orchestrator 3.0.0-4.1.2 HTTP Header InjectionIBM Aspera Orchestrator 3.0.0 through 4.1.2 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking |
|