Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14974: CWE-639 Authorization Bypass Through User-Controlled Key in IBM InfoSphere Information Server

0
Medium
VulnerabilityCVE-2025-14974cvecve-2025-14974cwe-639
Published: Wed Mar 25 2026 (03/25/2026, 20:20:27 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: InfoSphere Information Server

Description

IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable due to Insecure Direct Object Reference (IDOR).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 20:48:21 UTC

Technical Analysis

CVE-2025-14974 is an authorization bypass vulnerability in IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6. The root cause is an Insecure Direct Object Reference (IDOR), where the application improperly validates user-controlled keys used to access internal objects or data. This flaw allows an authenticated user with limited privileges to bypass authorization checks and gain unauthorized access to sensitive information. The vulnerability is categorized under CWE-639, which involves authorization bypass through user-controlled keys. The CVSS v3.1 base score is 5.7, with the vector indicating the attack requires adjacent network access (AV:A), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). Although no public exploits are known, the vulnerability poses a significant risk to confidentiality if exploited. The lack of patches at the time of publication necessitates immediate mitigation efforts by affected organizations. IBM InfoSphere Information Server is widely used in enterprise data integration and governance, making this vulnerability relevant to organizations relying on this platform for critical data workflows.

Potential Impact

The primary impact of CVE-2025-14974 is unauthorized disclosure of sensitive data due to bypassed authorization controls. Attackers with low-level authenticated access can exploit this vulnerability to access data they should not be permitted to see, potentially exposing confidential business information, personally identifiable information (PII), or other sensitive datasets. This can lead to regulatory compliance violations, reputational damage, and loss of customer trust. Since the vulnerability does not affect data integrity or availability, the risk is confined to confidentiality breaches. However, the ease of exploitation (low complexity, no user interaction) and the widespread use of IBM InfoSphere Information Server in large enterprises globally increase the potential scope and impact. Organizations in regulated industries such as finance, healthcare, and government are particularly at risk due to the sensitivity of the data handled by InfoSphere. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-14974, organizations should first verify and restrict user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege users. Conduct thorough access control audits within IBM InfoSphere Information Server to identify and remediate any improper authorization configurations. Implement strict validation and sanitization of user-controlled keys or parameters used to access internal objects. Monitor logs and access patterns for unusual or unauthorized data access attempts, especially from users with limited privileges. Employ network segmentation to limit access to the InfoSphere environment to trusted users and systems. Until IBM releases an official patch, consider deploying compensating controls such as enhanced monitoring, alerting, and temporary restrictions on sensitive data access. Engage with IBM support for guidance and timely updates on patch availability. Additionally, educate administrators and users about the risks of authorization bypass vulnerabilities and the importance of adhering to least privilege principles.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-12-19T15:09:58.873Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c44608f4197a8e3b7facc7

Added to database: 3/25/2026, 8:31:04 PM

Last enriched: 3/25/2026, 8:48:21 PM

Last updated: 3/26/2026, 5:25:31 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses