Upload of Malicious Files Enables Server Exec in IBM watsonx.data 2.2-2.2.1
CVE-2025-36183 Published on February 17, 2026

Privileged User File Upload Vulnerability Leading to Limited Server-Side Execution affects watsonx.data
IBM watsonx.data 2.2 through 2.2.1 IBM Lakehouse could allow a privileged user to upload malicious files that could be executed server to modify limited files or data.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2025-36183 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is an Unrestricted File Upload Vulnerability?

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CVE-2025-36183 has been classified to as an Unrestricted File Upload vulnerability or weakness.


Products Associated with CVE-2025-36183

stack.watch emails you whenever new vulnerabilities are published in IBM Watsonxdata or IBM Watsonx Data. Just hit a watch button to start following.

 
 

Affected Versions

IBM watsonx.data:

Exploit Probability

EPSS
0.03%
Percentile
9.21%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.