Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14811: CWE-598 Use of GET Request Method With Sensitive Query Strings in IBM Sterling Partner Engagement Manager

0
Low
VulnerabilityCVE-2025-14811cvecve-2025-14811cwe-598
Published: Fri Mar 13 2026 (03/13/2026, 18:22:00 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling Partner Engagement Manager

Description

IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques.

AI-Powered Analysis

AILast updated: 03/13/2026, 18:44:06 UTC

Technical Analysis

CVE-2025-14811 identifies a vulnerability in IBM Sterling Partner Engagement Manager versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2, where sensitive information is transmitted via HTTP GET request query strings. The core issue is the use of the GET method to send sensitive data, which inherently exposes this data in URLs. Since URLs can be logged in various places such as browser history, proxy logs, and server logs, and are also visible in transit if encryption is not enforced, attackers positioned to perform man-in-the-middle (MITM) attacks can intercept these query strings and extract sensitive information. The vulnerability is classified under CWE-598, which concerns the use of GET requests with sensitive query strings. The CVSS v3.1 base score is 3.1, indicating low severity, with attack vector network (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No patches or exploits are currently known, but the vulnerability highlights insecure design choices in handling sensitive data within URLs rather than in request bodies or headers. This can lead to unintended information disclosure especially in environments where encrypted transport (e.g., HTTPS) is not strictly enforced or where network traffic can be intercepted.

Potential Impact

The primary impact of this vulnerability is the potential disclosure of sensitive information to unauthorized parties via interception of HTTP GET request query strings. This can lead to confidentiality breaches, potentially exposing credentials, tokens, or other sensitive parameters embedded in URLs. While the vulnerability does not affect data integrity or system availability, the exposure of sensitive data can facilitate further attacks such as session hijacking, unauthorized access, or information leakage that undermines organizational security. Organizations relying on IBM Sterling Partner Engagement Manager in affected versions may face increased risk if their network communications are not fully encrypted or if attackers have the capability to perform MITM attacks. The impact is limited by the requirement for network access and the high complexity of the attack, but the sensitivity of the data exposed could have regulatory and reputational consequences, especially in industries handling sensitive partner or transactional data.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first ensure that all communications with IBM Sterling Partner Engagement Manager are conducted over encrypted channels such as TLS/HTTPS to prevent interception of query strings. Network security controls should be implemented to detect and prevent MITM attacks, including the use of strong certificate validation and network segmentation. Review and refactor application logic to avoid placing sensitive information in URL query parameters; instead, use POST requests with parameters in the request body or secure headers. Monitor and audit logs to detect any unusual access patterns or data leakage. If possible, upgrade to versions of the product that do not exhibit this vulnerability once patches become available. Additionally, educate developers and administrators on secure coding practices regarding sensitive data transmission and enforce strict access controls to limit exposure. Employ web application firewalls (WAFs) to detect and block suspicious requests that may attempt to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-16T23:18:27.896Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b457cc2f860ef943762155

Added to database: 3/13/2026, 6:30:36 PM

Last enriched: 3/13/2026, 6:44:06 PM

Last updated: 3/14/2026, 2:52:37 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses