IBM Cognos Controller 11.0.0-11.1.1 Hardcoded Key Session Cookie Leak
CVE-2025-36326 Published on September 26, 2025

IBM Controller information disclosure
IBM Cognos Controller 11.0.0 through 11.0.1, and IBM Controller 11.1.0 through 11.1.1 could allow an attacker to obtain sensitive information due to the use of hardcoded cryptographic keys for signing session cookies.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2025-36326 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Use of Hard-coded Cryptographic Key

The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.


Products Associated with CVE-2025-36326

stack.watch emails you whenever new vulnerabilities are published in IBM Cognos Controller or IBM Controller. Just hit a watch button to start following.

 
 

Affected Versions

IBM Cognos Controller: IBM Controller:

Exploit Probability

EPSS
0.03%
Percentile
6.60%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.