Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13096: CWE-918 Server-Side Request Forgery (SSRF) in IBM Business Automation Workflow containers

0
High
VulnerabilityCVE-2025-13096cvecve-2025-13096cwe-918
Published: Mon Feb 02 2026 (02/02/2026, 20:56:48 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Business Automation Workflow containers

Description

IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007, V24.0.0 - V24.0.0-IF007 and IBM Business Automation Workflow traditional V25.0.0, V24.0.1, V24.0.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:44:40 UTC

Technical Analysis

CVE-2025-13096 is a vulnerability classified under CWE-918 (Server-Side Request Forgery) that affects IBM Business Automation Workflow containers versions 24.0.0 through 25.0.0, including interim fixes. The root cause is an XML External Entity (XXE) injection flaw during XML data processing, which allows a remote attacker with low privileges to manipulate XML input to force the server to make unauthorized requests to internal or external systems. This SSRF capability can lead to sensitive information disclosure, such as internal files or metadata, and can also be leveraged to consume server memory resources, potentially leading to denial of service conditions. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its attack surface. The CVSS v3.1 score is 7.1 (high), reflecting the ease of exploitation (network attack vector, low complexity) and the significant confidentiality impact, although integrity is not affected and availability impact is low. No known public exploits have been reported yet, but the vulnerability's presence in widely used IBM automation products makes it a critical concern for organizations relying on these systems for business process automation. The lack of currently available patches requires organizations to implement interim mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-13096 can be substantial, especially for those in sectors heavily reliant on IBM Business Automation Workflow containers, such as financial services, manufacturing, telecommunications, and government agencies. Exploitation could lead to unauthorized disclosure of sensitive internal data, including business logic, configuration files, or personally identifiable information processed by the workflow system. This could result in regulatory compliance violations under GDPR and other data protection laws, leading to legal and financial penalties. Additionally, memory exhaustion attacks could disrupt critical business automation processes, causing operational downtime and impacting service availability. The SSRF nature of the vulnerability also raises concerns about lateral movement within corporate networks, potentially exposing other internal systems. Given the interconnected nature of European enterprise IT environments, the vulnerability could have cascading effects if exploited in multi-tenant or cloud-hosted deployments.

Mitigation Recommendations

1. Monitor IBM’s official security advisories closely and apply patches or interim fixes as soon as they become available. 2. Until patches are released, restrict XML input sources by validating and sanitizing all incoming XML data to prevent malicious entity declarations. 3. Implement network segmentation and egress filtering to limit the ability of the vulnerable containers to make arbitrary outbound requests, thereby reducing SSRF impact. 4. Employ Web Application Firewalls (WAFs) or intrusion detection systems to detect and block suspicious XML payloads indicative of XXE attacks. 5. Review and harden container configurations to disable unnecessary XML features or external entity processing where possible. 6. Conduct regular security assessments and penetration testing focused on XML processing components within the workflow environment. 7. Educate development and operations teams about secure XML handling practices to prevent similar vulnerabilities in custom integrations or extensions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-11-12T21:55:13.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a03f

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/2/2026, 11:44:40 PM

Last updated: 2/5/2026, 1:10:47 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats