Skip to main content

CVE-2025-33093: CWE-260 Password in Configuration File in IBM Sterling Partner Engagement Manager

High
VulnerabilityCVE-2025-33093cvecve-2025-33093cwe-260
Published: Wed May 07 2025 (05/07/2025, 11:04:31 UTC)
Source: CVE
Vendor/Project: IBM
Product: Sterling Partner Engagement Manager

Description

IBM Sterling Partner Engagement Manager 6.1.0, 6.2.0, 6.2.2 JWT secret is stored in public Helm Charts and is not stored as a Kubernetes secret.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:12:54 UTC

Technical Analysis

CVE-2025-33093 is a high-severity vulnerability affecting IBM Sterling Partner Engagement Manager versions 6.1.0, 6.2.0, and 6.2.2. The vulnerability arises from improper handling of the JWT (JSON Web Token) secret key, which is stored in public Helm Charts rather than being securely stored as a Kubernetes secret. Helm Charts are used to package and deploy Kubernetes applications, and if sensitive information such as JWT secrets are embedded in publicly accessible Helm Charts, this exposes critical authentication credentials to unauthorized parties. The JWT secret is a cryptographic key used to sign tokens that authenticate users or services. Exposure of this secret allows attackers to forge valid JWT tokens, potentially bypassing authentication and gaining unauthorized access to the Sterling Partner Engagement Manager environment. The vulnerability is classified under CWE-260, which refers to the storage of passwords or secrets in configuration files in an insecure manner. The CVSS v3.1 score is 7.5 (high), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). This means an attacker can remotely exploit this vulnerability without authentication or user interaction, leading to full disclosure of sensitive information. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of the secret key exposure make this a significant risk. The lack of a patch link indicates that remediation may require configuration changes or updates from IBM. Organizations using affected versions should urgently review their deployment practices to ensure secrets are stored securely, such as using Kubernetes secrets or external secret management solutions, and avoid embedding sensitive information in publicly accessible Helm Charts.

Potential Impact

For European organizations using IBM Sterling Partner Engagement Manager, this vulnerability poses a significant risk to confidentiality and overall security posture. The exposure of the JWT secret can allow attackers to impersonate legitimate users or services, potentially accessing sensitive partner data, transactional information, and business workflows managed by the platform. This could lead to data breaches, unauthorized data manipulation, and disruption of partner engagement processes. Given the critical role of Sterling Partner Engagement Manager in supply chain and partner communications, exploitation could impact business continuity and trust relationships with partners. Additionally, exposure of sensitive data may lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. The vulnerability's network-exploitable nature means attackers can attempt exploitation remotely, increasing the threat surface. European organizations with cloud-native or Kubernetes-based deployments are particularly at risk if Helm Charts are publicly accessible or improperly managed. The lack of integrity and availability impact reduces the risk of service disruption but does not diminish the confidentiality breach severity. Overall, the vulnerability could facilitate lateral movement within networks and escalate privileges if combined with other weaknesses, amplifying its impact.

Mitigation Recommendations

1. Immediately audit all Helm Charts used in deployment pipelines to ensure no sensitive information, especially JWT secrets or passwords, are embedded in publicly accessible or internal charts. 2. Migrate all secrets, including JWT keys, to Kubernetes Secrets or a dedicated external secrets management system such as HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault, ensuring encryption at rest and controlled access. 3. Rotate the exposed JWT secrets promptly to invalidate any potentially compromised tokens. 4. Implement strict access controls and RBAC policies on Kubernetes clusters to limit who can view or modify secrets and Helm Charts. 5. Review and restrict Helm Chart repository access, ensuring private repositories are used for sensitive deployments. 6. Monitor logs and network traffic for suspicious JWT usage patterns indicative of token forgery or unauthorized access attempts. 7. Stay updated with IBM security advisories for patches or updated versions addressing this vulnerability and apply them as soon as available. 8. Incorporate automated security scanning of Helm Charts and Kubernetes manifests in CI/CD pipelines to detect secret leakage before deployment. 9. Educate DevOps and security teams on secure secret management best practices to prevent recurrence. These steps go beyond generic advice by focusing on deployment pipeline hygiene, secret lifecycle management, and proactive monitoring tailored to Kubernetes and Helm environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:31.398Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9bb9

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:12:54 PM

Last updated: 8/5/2025, 12:05:13 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats