CVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.
AI Analysis
Technical Summary
CVE-2025-33096 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The issue arises from CWE-674, which is characterized by uncontrolled recursion that can lead to resource exhaustion and denial of service. Specifically, an authenticated user can upload specially crafted files that trigger uncontrolled recursive processing within the application. This recursive behavior can cause the application to consume excessive CPU or memory resources, ultimately leading to a denial of service condition where legitimate users are unable to access the service. The vulnerability requires the attacker to have valid credentials (privileges) to upload files, but does not require any further user interaction. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely once authenticated. The CVSS v3.1 score of 6.5 reflects a medium severity, with no impact on confidentiality or integrity, but a high impact on availability. Currently, there are no known exploits in the wild and no official patches have been published, indicating that organizations should be vigilant and prepare mitigation strategies. The vulnerability is particularly relevant for organizations that use IBM DOORS Next for requirements management in software and systems engineering, as denial of service could disrupt critical development workflows.
Potential Impact
For European organizations, the primary impact is a denial of service that can disrupt engineering and development processes relying on IBM DOORS Next. This can delay project timelines, reduce productivity, and potentially impact compliance with regulatory requirements in industries such as automotive, aerospace, defense, and manufacturing where requirements traceability is critical. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The lack of confidentiality or integrity impact limits data breach concerns, but availability interruptions can have cascading effects on dependent systems and teams. Organizations with large-scale deployments or those integrating DOORS Next into continuous integration/continuous deployment (CI/CD) pipelines may experience amplified disruption. The absence of known exploits reduces immediate risk, but the medium severity score and the critical nature of affected processes warrant proactive mitigation.
Mitigation Recommendations
1. Restrict file upload permissions to only trusted and necessary users to reduce the attack surface. 2. Implement strict input validation and scanning of uploaded files to detect and block malformed or suspicious content that could trigger recursion. 3. Monitor application resource usage (CPU, memory) closely to detect abnormal spikes that may indicate exploitation attempts. 4. Enforce strong authentication and credential management policies to prevent unauthorized access. 5. Isolate the DOORS Next environment where possible to limit impact scope. 6. Engage with IBM support and subscribe to security advisories to obtain patches or updates as soon as they become available. 7. Consider implementing rate limiting or upload size restrictions to mitigate resource exhaustion risks. 8. Conduct regular security assessments and penetration testing focused on file upload functionalities. 9. Prepare incident response plans specifically addressing denial of service scenarios in engineering tools. 10. Educate users about the risks of uploading untrusted files even within authenticated sessions.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden
CVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next
Description
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.
AI-Powered Analysis
Technical Analysis
CVE-2025-33096 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The issue arises from CWE-674, which is characterized by uncontrolled recursion that can lead to resource exhaustion and denial of service. Specifically, an authenticated user can upload specially crafted files that trigger uncontrolled recursive processing within the application. This recursive behavior can cause the application to consume excessive CPU or memory resources, ultimately leading to a denial of service condition where legitimate users are unable to access the service. The vulnerability requires the attacker to have valid credentials (privileges) to upload files, but does not require any further user interaction. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely once authenticated. The CVSS v3.1 score of 6.5 reflects a medium severity, with no impact on confidentiality or integrity, but a high impact on availability. Currently, there are no known exploits in the wild and no official patches have been published, indicating that organizations should be vigilant and prepare mitigation strategies. The vulnerability is particularly relevant for organizations that use IBM DOORS Next for requirements management in software and systems engineering, as denial of service could disrupt critical development workflows.
Potential Impact
For European organizations, the primary impact is a denial of service that can disrupt engineering and development processes relying on IBM DOORS Next. This can delay project timelines, reduce productivity, and potentially impact compliance with regulatory requirements in industries such as automotive, aerospace, defense, and manufacturing where requirements traceability is critical. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The lack of confidentiality or integrity impact limits data breach concerns, but availability interruptions can have cascading effects on dependent systems and teams. Organizations with large-scale deployments or those integrating DOORS Next into continuous integration/continuous deployment (CI/CD) pipelines may experience amplified disruption. The absence of known exploits reduces immediate risk, but the medium severity score and the critical nature of affected processes warrant proactive mitigation.
Mitigation Recommendations
1. Restrict file upload permissions to only trusted and necessary users to reduce the attack surface. 2. Implement strict input validation and scanning of uploaded files to detect and block malformed or suspicious content that could trigger recursion. 3. Monitor application resource usage (CPU, memory) closely to detect abnormal spikes that may indicate exploitation attempts. 4. Enforce strong authentication and credential management policies to prevent unauthorized access. 5. Isolate the DOORS Next environment where possible to limit impact scope. 6. Engage with IBM support and subscribe to security advisories to obtain patches or updates as soon as they become available. 7. Consider implementing rate limiting or upload size restrictions to mitigate resource exhaustion risks. 8. Conduct regular security assessments and penetration testing focused on file upload functionalities. 9. Prepare incident response plans specifically addressing denial of service scenarios in engineering tools. 10. Educate users about the risks of uploading untrusted files even within authenticated sessions.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T17:50:40.773Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ebb20ce7e4c74b800ba671
Added to database: 10/12/2025, 1:50:04 PM
Last enriched: 10/20/2025, 1:15:51 AM
Last updated: 1/18/2026, 8:54:25 AM
Views: 148
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Wireshark 4.6.3 Released, (Sat, Jan 17th)
Medium"How many states are there in the United States?", (Sun, Jan 18th)
MediumTennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System
MediumBlack Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
MediumCVE-2025-15535: NULL Pointer Dereference in nicbarker clay
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.