CVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.
AI Analysis
Technical Summary
CVE-2025-33096 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The issue arises from CWE-674, which is characterized by uncontrolled recursion that can lead to resource exhaustion and denial of service. Specifically, an authenticated user can upload specially crafted files that trigger uncontrolled recursive processing within the application. This recursive behavior can cause the application to consume excessive CPU or memory resources, ultimately leading to a denial of service condition where legitimate users are unable to access the service. The vulnerability requires the attacker to have valid credentials (privileges) to upload files, but does not require any further user interaction. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely once authenticated. The CVSS v3.1 score of 6.5 reflects a medium severity, with no impact on confidentiality or integrity, but a high impact on availability. Currently, there are no known exploits in the wild and no official patches have been published, indicating that organizations should be vigilant and prepare mitigation strategies. The vulnerability is particularly relevant for organizations that use IBM DOORS Next for requirements management in software and systems engineering, as denial of service could disrupt critical development workflows.
Potential Impact
For European organizations, the primary impact is a denial of service that can disrupt engineering and development processes relying on IBM DOORS Next. This can delay project timelines, reduce productivity, and potentially impact compliance with regulatory requirements in industries such as automotive, aerospace, defense, and manufacturing where requirements traceability is critical. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The lack of confidentiality or integrity impact limits data breach concerns, but availability interruptions can have cascading effects on dependent systems and teams. Organizations with large-scale deployments or those integrating DOORS Next into continuous integration/continuous deployment (CI/CD) pipelines may experience amplified disruption. The absence of known exploits reduces immediate risk, but the medium severity score and the critical nature of affected processes warrant proactive mitigation.
Mitigation Recommendations
1. Restrict file upload permissions to only trusted and necessary users to reduce the attack surface. 2. Implement strict input validation and scanning of uploaded files to detect and block malformed or suspicious content that could trigger recursion. 3. Monitor application resource usage (CPU, memory) closely to detect abnormal spikes that may indicate exploitation attempts. 4. Enforce strong authentication and credential management policies to prevent unauthorized access. 5. Isolate the DOORS Next environment where possible to limit impact scope. 6. Engage with IBM support and subscribe to security advisories to obtain patches or updates as soon as they become available. 7. Consider implementing rate limiting or upload size restrictions to mitigate resource exhaustion risks. 8. Conduct regular security assessments and penetration testing focused on file upload functionalities. 9. Prepare incident response plans specifically addressing denial of service scenarios in engineering tools. 10. Educate users about the risks of uploading untrusted files even within authenticated sessions.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden
CVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next
Description
IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.
AI-Powered Analysis
Technical Analysis
CVE-2025-33096 is a vulnerability identified in IBM Engineering Requirements Management DOORS Next versions 7.0.2, 7.0.3, and 7.1. The issue arises from CWE-674, which is characterized by uncontrolled recursion that can lead to resource exhaustion and denial of service. Specifically, an authenticated user can upload specially crafted files that trigger uncontrolled recursive processing within the application. This recursive behavior can cause the application to consume excessive CPU or memory resources, ultimately leading to a denial of service condition where legitimate users are unable to access the service. The vulnerability requires the attacker to have valid credentials (privileges) to upload files, but does not require any further user interaction. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely once authenticated. The CVSS v3.1 score of 6.5 reflects a medium severity, with no impact on confidentiality or integrity, but a high impact on availability. Currently, there are no known exploits in the wild and no official patches have been published, indicating that organizations should be vigilant and prepare mitigation strategies. The vulnerability is particularly relevant for organizations that use IBM DOORS Next for requirements management in software and systems engineering, as denial of service could disrupt critical development workflows.
Potential Impact
For European organizations, the primary impact is a denial of service that can disrupt engineering and development processes relying on IBM DOORS Next. This can delay project timelines, reduce productivity, and potentially impact compliance with regulatory requirements in industries such as automotive, aerospace, defense, and manufacturing where requirements traceability is critical. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk. The lack of confidentiality or integrity impact limits data breach concerns, but availability interruptions can have cascading effects on dependent systems and teams. Organizations with large-scale deployments or those integrating DOORS Next into continuous integration/continuous deployment (CI/CD) pipelines may experience amplified disruption. The absence of known exploits reduces immediate risk, but the medium severity score and the critical nature of affected processes warrant proactive mitigation.
Mitigation Recommendations
1. Restrict file upload permissions to only trusted and necessary users to reduce the attack surface. 2. Implement strict input validation and scanning of uploaded files to detect and block malformed or suspicious content that could trigger recursion. 3. Monitor application resource usage (CPU, memory) closely to detect abnormal spikes that may indicate exploitation attempts. 4. Enforce strong authentication and credential management policies to prevent unauthorized access. 5. Isolate the DOORS Next environment where possible to limit impact scope. 6. Engage with IBM support and subscribe to security advisories to obtain patches or updates as soon as they become available. 7. Consider implementing rate limiting or upload size restrictions to mitigate resource exhaustion risks. 8. Conduct regular security assessments and penetration testing focused on file upload functionalities. 9. Prepare incident response plans specifically addressing denial of service scenarios in engineering tools. 10. Educate users about the risks of uploading untrusted files even within authenticated sessions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T17:50:40.773Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ebb20ce7e4c74b800ba671
Added to database: 10/12/2025, 1:50:04 PM
Last enriched: 10/20/2025, 1:15:51 AM
Last updated: 12/5/2025, 1:59:32 AM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62223: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.