Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13096: CWE-918 Server-Side Request Forgery (SSRF) in IBM Business Automation Workflow containers

0
High
VulnerabilityCVE-2025-13096cvecve-2025-13096cwe-918
Published: Mon Feb 02 2026 (02/02/2026, 20:56:48 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Business Automation Workflow containers

Description

CVE-2025-13096 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting IBM Business Automation Workflow containers versions 24. 0. 0 through 25. 0. 0. The flaw arises from XML External Entity (XXE) injection during XML data processing, allowing remote attackers with limited privileges to access sensitive information or cause memory resource exhaustion. Exploitation requires network access and low privileges but no user interaction. While no known exploits are reported in the wild, the vulnerability poses a significant risk to confidentiality and system stability. European organizations using affected IBM workflow containers should prioritize patching once available and implement network segmentation and input validation to mitigate risk. Countries with strong IBM enterprise adoption and critical automation infrastructure, such as Germany, France, and the UK, are most likely impacted.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:04:46 UTC

Technical Analysis

CVE-2025-13096 is a Server-Side Request Forgery (SSRF) vulnerability categorized under CWE-918, found in IBM Business Automation Workflow containers versions 24.0.0 through 25.0.0, including their interim fixes up to IF007. The vulnerability stems from improper handling of XML input, specifically an XML External Entity (XXE) injection flaw. When processing crafted XML data, the affected software can be tricked into making unauthorized requests or accessing internal resources, potentially exposing sensitive information such as internal files or metadata. Additionally, the flaw can be leveraged to consume excessive memory resources, leading to denial-of-service conditions. The vulnerability requires the attacker to have network access and low privileges (PR:L) but does not require user interaction (UI:N). The CVSS v3.1 base score is 7.1, reflecting high severity due to the potential for confidentiality breaches and partial availability impact. No public exploits are currently known, but the vulnerability is published and should be considered a significant risk in environments running the affected IBM Business Automation Workflow containers. The lack of available patches at the time of disclosure necessitates proactive mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2025-13096 can be substantial, particularly for enterprises relying on IBM Business Automation Workflow containers for critical business processes and automation. Successful exploitation could lead to unauthorized disclosure of sensitive internal information, potentially including configuration files, credentials, or business data, undermining confidentiality. Memory exhaustion attacks could degrade system performance or cause service outages, impacting availability and business continuity. Given the integration of these workflow containers in automation pipelines, disruptions could cascade into operational delays or failures. The vulnerability's exploitation requires only low privileges and network access, increasing the risk in multi-tenant or cloud environments common in Europe. Organizations in regulated sectors such as finance, healthcare, and manufacturing could face compliance and reputational risks if sensitive data is exposed or services disrupted.

Mitigation Recommendations

Until official patches are released by IBM, European organizations should implement several targeted mitigations: 1) Restrict network access to IBM Business Automation Workflow containers by enforcing strict firewall rules and network segmentation, limiting exposure to trusted internal networks only. 2) Employ input validation and XML parsing hardening techniques to disable or restrict external entity processing in XML parsers used by the workflow containers, if configurable. 3) Monitor network traffic and application logs for unusual outbound requests or memory usage spikes indicative of SSRF or resource exhaustion attempts. 4) Apply the principle of least privilege to user accounts interacting with the workflow containers to minimize the attack surface. 5) Prepare for rapid deployment of IBM patches by maintaining up-to-date asset inventories and testing patch application procedures. 6) Consider deploying Web Application Firewalls (WAFs) or runtime application self-protection (RASP) solutions capable of detecting and blocking SSRF and XXE attack patterns. 7) Conduct security awareness training for administrators and developers on the risks of XXE and SSRF vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-11-12T21:55:13.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813002f9fa50a62f63a03f

Added to database: 2/2/2026, 11:15:14 PM

Last enriched: 2/10/2026, 11:04:46 AM

Last updated: 3/25/2026, 3:19:38 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses