Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36174: CWE-434 Unrestricted Upload of File with Dangerous Type in IBM Integrated Analytics System

0
High
VulnerabilityCVE-2025-36174cvecve-2025-36174cwe-434
Published: Sun Aug 24 2025 (08/24/2025, 01:21:41 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Integrated Analytics System

Description

IBM Integrated Analytics System 1.0.0.0 through 1.0.30.0 could allow an authenticated user to upload a file with dangerous types that could be executed by another user if opened.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:46:13 UTC

Technical Analysis

CVE-2025-36174 is a vulnerability identified in IBM Integrated Analytics System versions 1.0.0.0 through 1.0.30.0, categorized under CWE-434, which involves the unrestricted upload of files with dangerous types. The flaw allows an authenticated user to upload files that are not properly validated or restricted by file type, enabling potentially malicious files to be stored on the system. When another user opens such a file, it could be executed, leading to unauthorized code execution or other malicious actions. The vulnerability requires the attacker to have valid credentials (authenticated user) and involves user interaction (another user opening the file). The CVSS v3.1 base score is 8.0, reflecting high severity due to the network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. The scope remains unchanged, meaning the impact is confined to the vulnerable component. Although no public exploits are reported yet, the vulnerability presents a significant risk because it can lead to privilege escalation, data leakage, or system compromise within environments using IBM Integrated Analytics System. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps.

Potential Impact

The potential impact of CVE-2025-36174 is substantial for organizations using IBM Integrated Analytics System. Successful exploitation could allow attackers to execute arbitrary code by tricking users into opening malicious files, leading to data breaches, unauthorized access, or disruption of analytics operations. Confidentiality is at risk due to possible data exfiltration, integrity can be compromised by unauthorized modifications, and availability may be affected if malicious payloads disrupt system functionality. Since the vulnerability requires authentication, insider threats or compromised credentials increase risk. The analytics system often handles sensitive business intelligence and operational data, so exploitation could have severe consequences for decision-making and compliance. Additionally, the ability to execute code remotely via file upload could serve as a foothold for lateral movement within enterprise networks, amplifying the threat. Organizations relying on this IBM product for critical analytics workloads should consider this vulnerability a high priority for remediation to avoid operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-36174, organizations should implement the following specific measures: 1) Restrict file upload functionality to only allow safe file types through strict server-side validation and sanitization, ensuring dangerous file types are blocked. 2) Enforce the principle of least privilege for authenticated users, limiting upload permissions to only those who require it. 3) Implement robust user awareness training to reduce the likelihood of users opening suspicious files. 4) Monitor and audit file uploads and access logs for unusual activity indicative of exploitation attempts. 5) Apply network segmentation to isolate the analytics system from other critical infrastructure to limit lateral movement. 6) Deploy endpoint protection solutions capable of detecting and blocking execution of unauthorized file types. 7) Regularly update and patch IBM Integrated Analytics System as vendor fixes become available. 8) Consider implementing application-layer controls such as web application firewalls (WAFs) to detect and block malicious upload attempts. These targeted mitigations go beyond generic advice by focusing on controlling upload vectors, user permissions, and monitoring specific to this vulnerability’s characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:22.577Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68aa6bbbad5a09ad002d0c36

Added to database: 8/24/2025, 1:32:43 AM

Last enriched: 2/27/2026, 1:46:13 AM

Last updated: 3/25/2026, 3:09:46 AM

Views: 307

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses