Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13855: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Storage Protect Server

0
High
VulnerabilityCVE-2025-13855cvecve-2025-13855cwe-89
Published: Wed Apr 01 2026 (04/01/2026, 00:23:28 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Storage Protect Server

Description

CVE-2025-13855 is a high-severity SQL injection vulnerability affecting IBM Storage Protect Server version 8. 2. 0. This flaw allows a remote attacker with low privileges to send specially crafted SQL commands to the back-end database without requiring user interaction. Successful exploitation can lead to unauthorized viewing, modification, addition, or deletion of sensitive data stored in the database. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to data confidentiality, integrity, and availability. Organizations using the affected IBM product should prioritize applying patches or mitigations once available. This vulnerability is particularly relevant to enterprises relying on IBM Storage Protect Server for data protection and backup management. Countries with significant IBM enterprise deployments and critical infrastructure relying on such systems are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 01:23:23 UTC

Technical Analysis

CVE-2025-13855 identifies a critical SQL injection vulnerability in IBM Storage Protect Server version 8.2.0. The vulnerability stems from improper neutralization of special characters in SQL commands, classified under CWE-89. An attacker with network access and low privileges can remotely inject malicious SQL statements into the back-end database queries. This injection flaw enables unauthorized actions such as reading sensitive information, modifying existing data, inserting new records, or deleting data, potentially compromising the confidentiality, integrity, and availability of the system's stored information. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only low privileges (PR:L), but no user interaction (UI:N) is needed. The vulnerability scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS v3.1 base score is 7.6, indicating a high severity level. No public exploits have been reported yet, but the vulnerability's nature and impact make it a prime target for attackers once exploit code becomes available. IBM has not yet published patches or mitigation instructions, so organizations must monitor for updates and implement interim controls. The vulnerability affects critical backup and storage management infrastructure, which is often integral to enterprise data protection strategies.

Potential Impact

The exploitation of CVE-2025-13855 can have severe consequences for organizations globally. Attackers can gain unauthorized access to sensitive backup and storage data, potentially exposing confidential business information, customer data, or intellectual property. Data integrity could be compromised by unauthorized modifications or deletions, undermining trust in backup data and recovery processes. Availability may also be affected if attackers delete or corrupt critical data, disrupting business continuity and disaster recovery capabilities. Given that IBM Storage Protect Server is widely used in enterprise environments for data protection, this vulnerability could impact sectors such as finance, healthcare, government, and large-scale IT service providers. The ability to exploit this vulnerability remotely with low privileges and no user interaction increases the risk of automated attacks and rapid spread. Organizations that fail to address this vulnerability may face regulatory compliance issues, reputational damage, and financial losses due to data breaches or operational disruptions.

Mitigation Recommendations

To mitigate CVE-2025-13855, organizations should immediately inventory their IBM Storage Protect Server deployments to identify affected versions (8.2.0). Since no official patches are currently available, implement the following specific controls: 1) Restrict network access to the Storage Protect Server database interfaces using firewalls and network segmentation to limit exposure to trusted hosts only. 2) Enforce strict access controls and least privilege principles for accounts interacting with the database, minimizing the risk from low-privilege attackers. 3) Monitor database query logs and application logs for unusual or suspicious SQL statements indicative of injection attempts. 4) Employ Web Application Firewalls (WAFs) or database activity monitoring tools capable of detecting and blocking SQL injection patterns targeting the Storage Protect Server. 5) Prepare for rapid deployment of official patches or updates from IBM once released. 6) Conduct regular security assessments and penetration testing focused on injection vulnerabilities in backup and storage management systems. 7) Educate administrators and security teams about this vulnerability and the importance of timely mitigation. These targeted actions go beyond generic advice by focusing on network-level controls, monitoring, and proactive detection tailored to the affected product and vulnerability type.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-01T20:26:14.425Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc7001e6bfc5ba1d749752

Added to database: 4/1/2026, 1:08:17 AM

Last enriched: 4/1/2026, 1:23:23 AM

Last updated: 4/1/2026, 3:12:45 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses