Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27904: CWE-352 Cross-Site Request Forgery (CSRF) in IBM DB2 Recovery Expert for LUW

0
Medium
VulnerabilityCVE-2025-27904cvecve-2025-27904cwe-352
Published: Tue Feb 17 2026 (02/17/2026, 19:30:28 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: DB2 Recovery Expert for LUW

Description

IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:18:52 UTC

Technical Analysis

CVE-2025-27904 identifies a Cross-Site Request Forgery (CSRF) vulnerability in IBM DB2 Recovery Expert for Linux, UNIX, and Windows (LUW) version 5.5 Interim Fix 002. CSRF vulnerabilities occur when a web application does not sufficiently verify that requests originate from legitimate users, allowing attackers to craft malicious requests that execute unauthorized actions on behalf of authenticated users. In this case, the DB2 Recovery Expert web interface lacks adequate CSRF protections, enabling attackers to exploit this weakness by tricking users into submitting malicious requests, for example, via a specially crafted URL or embedded HTML form. The vulnerability does not expose sensitive data (no confidentiality impact) but can cause unauthorized changes to the recovery configurations or operations, impacting data integrity. The CVSS v3.1 base score is 6.5, reflecting a network attack vector with low attack complexity, no privileges required, but requiring user interaction. The scope remains unchanged, meaning the attack affects only the vulnerable component. No patches are currently linked, and no known exploits have been reported in the wild, indicating the vulnerability is newly disclosed or not yet actively exploited. IBM DB2 Recovery Expert is a specialized tool used for database recovery management, making this vulnerability particularly relevant to organizations relying on IBM DB2 for critical data recovery workflows.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of database recovery configurations and operations. Unauthorized actions executed via CSRF could lead to improper recovery procedures, potentially causing data inconsistencies or downtime during critical recovery scenarios. While confidentiality and availability impacts are minimal, the integrity breach could disrupt business continuity and data reliability. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often use IBM DB2 for critical data management, could face operational risks. Additionally, the requirement for user interaction means social engineering or phishing campaigns could be leveraged to exploit this vulnerability. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. European entities with exposed or poorly segmented management interfaces are at higher risk.

Mitigation Recommendations

Organizations should monitor IBM security advisories for patches addressing this vulnerability and apply them promptly once available. In the interim, implement strict access controls to limit exposure of the DB2 Recovery Expert web interface to trusted networks and users only. Employ web application firewalls (WAFs) with rules to detect and block CSRF attack patterns. Enable or enforce the use of anti-CSRF tokens or similar verification mechanisms if configurable within the product. Educate users about the risks of clicking unsolicited links or opening suspicious emails that could trigger CSRF attacks. Network segmentation and multi-factor authentication (MFA) for administrative access can further reduce risk. Regularly audit and monitor logs for unusual or unauthorized recovery operations. Finally, consider disabling or restricting web interface functionalities that are not essential to reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-03-10T17:14:03.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575b980d747be20537631

Added to database: 2/18/2026, 8:18:01 AM

Last enriched: 2/18/2026, 8:18:52 AM

Last updated: 2/21/2026, 12:18:20 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats