Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14914: CWE-22 in IBM WebSphere Application Server Liberty

0
High
VulnerabilityCVE-2025-14914cvecve-2025-14914cwe-22
Published: Mon Feb 02 2026 (02/02/2026, 15:17:57 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: WebSphere Application Server Liberty

Description

IBM WebSphere Application Server Liberty 17.0.0.3 through 26.0.0.1 could allow a privileged user to upload a zip archive containing path traversal sequences resulting in an overwrite of files leading to arbitrary code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:11:16 UTC

Technical Analysis

CVE-2025-14914 is a path traversal vulnerability classified under CWE-22 affecting IBM WebSphere Application Server Liberty versions from 17.0.0.3 up to 26.0.0.1. The vulnerability arises because the server improperly validates the contents of uploaded zip archives, allowing a privileged user to include path traversal sequences (e.g., '../') within the archive. When such a crafted archive is extracted, it can overwrite arbitrary files on the server's filesystem outside the intended directory. This file overwrite capability can be leveraged to replace critical configuration files or deploy malicious binaries, ultimately enabling arbitrary code execution with the privileges of the WebSphere server process. The CVSS v3.1 base score is 7.6, reflecting a high severity due to the potential for complete system compromise. Exploitation requires the attacker to have privileged access and perform the upload action, with user interaction needed to trigger the vulnerability. The vulnerability affects a core middleware product widely used for hosting Java EE applications in enterprise environments, making it a significant risk for organizations relying on IBM WebSphere Application Server Liberty for critical business applications. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported as of the publication date.

Potential Impact

The impact of CVE-2025-14914 is substantial for organizations using IBM WebSphere Application Server Liberty. Successful exploitation can lead to arbitrary code execution, allowing attackers to fully compromise the affected server. This can result in unauthorized access to sensitive data, disruption of business-critical applications, and potential lateral movement within the network. The ability to overwrite arbitrary files may also enable attackers to disable security controls or implant persistent backdoors. Given the middleware's role in enterprise application hosting, the vulnerability could affect a wide range of industries including finance, healthcare, government, and manufacturing. The requirement for privileged access limits the attack surface somewhat, but insider threats or compromised administrative accounts could be leveraged. The absence of known exploits currently reduces immediate risk, but the high severity and potential impact necessitate urgent remediation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-14914, organizations should first apply any available patches or updates from IBM as soon as they are released. In the absence of patches, administrators should restrict upload permissions strictly to trusted users and monitor upload activities closely. Implementing file integrity monitoring on critical directories can help detect unauthorized file modifications. Employing application-layer controls to validate and sanitize uploaded archive contents before extraction is recommended. Additionally, running WebSphere Application Server Liberty with the least privileges necessary and isolating it within segmented network zones can limit the impact of a successful exploit. Regularly auditing privileged accounts and enforcing strong authentication mechanisms will reduce the risk of privilege misuse. Organizations should also maintain comprehensive logging and alerting to detect suspicious activities related to file uploads and server modifications. Finally, consider using runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to identify and block exploitation attempts in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-18T19:36:37.167Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6980c319f9fa50a62f48b5d8

Added to database: 2/2/2026, 3:30:33 PM

Last enriched: 2/27/2026, 7:11:16 AM

Last updated: 3/25/2026, 5:49:58 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses