CVE-2025-33004: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in IBM Planning Analytics Local
IBM Planning Analytics Local 2.0 and 2.1 could allow a privileged user to delete files from directories due to improper pathname restriction.
AI Analysis
Technical Summary
CVE-2025-33004 is a path traversal vulnerability identified in IBM Planning Analytics Local versions 2.0 and 2.1. This vulnerability arises from improper limitation of a pathname to a restricted directory (CWE-22), allowing a privileged user to delete files outside of intended directories. Specifically, the flaw permits a user with elevated privileges to manipulate file paths in such a way that the system does not correctly restrict access to sensitive directories, enabling unauthorized deletion of files. The vulnerability does not require user interaction but does require privileged access, which means exploitation is limited to users who already have elevated permissions on the system. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high impact on integrity (I:H) and availability (A:H). This indicates that while confidentiality is not compromised, the integrity and availability of the system can be significantly affected by unauthorized file deletions. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability is particularly concerning in environments where IBM Planning Analytics Local is used for critical business planning and analytics, as file deletion could disrupt operations or lead to data loss.
Potential Impact
For European organizations using IBM Planning Analytics Local 2.0 or 2.1, this vulnerability poses a risk primarily to the integrity and availability of their analytics environments. Since the flaw allows privileged users to delete files outside of intended directories, it could lead to loss of critical configuration files, data files, or system components, resulting in service disruption or downtime. This could impact financial planning, forecasting, and decision-making processes that rely on the availability and accuracy of analytics data. Although exploitation requires privileged access, insider threats or compromised privileged accounts could leverage this vulnerability to cause damage or sabotage. The lack of confidentiality impact reduces the risk of data leakage, but the potential for operational disruption is significant. Given the reliance on IBM Planning Analytics in sectors such as finance, manufacturing, and government within Europe, the operational impact could be substantial, especially if recovery mechanisms or backups are insufficient. Additionally, the medium severity rating suggests that while the threat is not critical, timely remediation is important to prevent exploitation in sensitive environments.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Restrict privileged access strictly to trusted administrators and enforce the principle of least privilege to minimize the number of users who can exploit this vulnerability. 2) Monitor and audit privileged user activities closely to detect any unusual file deletion or path manipulation attempts. 3) Implement robust backup and recovery procedures for IBM Planning Analytics Local environments to quickly restore any deleted files and minimize downtime. 4) Apply any available vendor patches or updates as soon as IBM releases them; in the absence of patches, consider temporary compensating controls such as filesystem permissions hardening to restrict deletion rights even for privileged users where feasible. 5) Use application whitelisting or endpoint protection solutions that can detect and block unauthorized file deletions or suspicious filesystem operations. 6) Conduct regular security training for administrators to raise awareness about the risks of path traversal vulnerabilities and the importance of secure file handling practices. 7) If possible, isolate IBM Planning Analytics Local instances in segmented network zones to limit the potential impact of compromised privileged accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-33004: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in IBM Planning Analytics Local
Description
IBM Planning Analytics Local 2.0 and 2.1 could allow a privileged user to delete files from directories due to improper pathname restriction.
AI-Powered Analysis
Technical Analysis
CVE-2025-33004 is a path traversal vulnerability identified in IBM Planning Analytics Local versions 2.0 and 2.1. This vulnerability arises from improper limitation of a pathname to a restricted directory (CWE-22), allowing a privileged user to delete files outside of intended directories. Specifically, the flaw permits a user with elevated privileges to manipulate file paths in such a way that the system does not correctly restrict access to sensitive directories, enabling unauthorized deletion of files. The vulnerability does not require user interaction but does require privileged access, which means exploitation is limited to users who already have elevated permissions on the system. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high impact on integrity (I:H) and availability (A:H). This indicates that while confidentiality is not compromised, the integrity and availability of the system can be significantly affected by unauthorized file deletions. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The vulnerability is particularly concerning in environments where IBM Planning Analytics Local is used for critical business planning and analytics, as file deletion could disrupt operations or lead to data loss.
Potential Impact
For European organizations using IBM Planning Analytics Local 2.0 or 2.1, this vulnerability poses a risk primarily to the integrity and availability of their analytics environments. Since the flaw allows privileged users to delete files outside of intended directories, it could lead to loss of critical configuration files, data files, or system components, resulting in service disruption or downtime. This could impact financial planning, forecasting, and decision-making processes that rely on the availability and accuracy of analytics data. Although exploitation requires privileged access, insider threats or compromised privileged accounts could leverage this vulnerability to cause damage or sabotage. The lack of confidentiality impact reduces the risk of data leakage, but the potential for operational disruption is significant. Given the reliance on IBM Planning Analytics in sectors such as finance, manufacturing, and government within Europe, the operational impact could be substantial, especially if recovery mechanisms or backups are insufficient. Additionally, the medium severity rating suggests that while the threat is not critical, timely remediation is important to prevent exploitation in sensitive environments.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Restrict privileged access strictly to trusted administrators and enforce the principle of least privilege to minimize the number of users who can exploit this vulnerability. 2) Monitor and audit privileged user activities closely to detect any unusual file deletion or path manipulation attempts. 3) Implement robust backup and recovery procedures for IBM Planning Analytics Local environments to quickly restore any deleted files and minimize downtime. 4) Apply any available vendor patches or updates as soon as IBM releases them; in the absence of patches, consider temporary compensating controls such as filesystem permissions hardening to restrict deletion rights even for privileged users where feasible. 5) Use application whitelisting or endpoint protection solutions that can detect and block unauthorized file deletions or suspicious filesystem operations. 6) Conduct regular security training for administrators to raise awareness about the risks of path traversal vulnerabilities and the importance of secure file handling practices. 7) If possible, isolate IBM Planning Analytics Local instances in segmented network zones to limit the potential impact of compromised privileged accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T09:48:49.853Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683c4b86182aa0cae212f9b3
Added to database: 6/1/2025, 12:45:58 PM
Last enriched: 7/9/2025, 12:57:12 AM
Last updated: 8/12/2025, 8:44:03 PM
Views: 17
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.