Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36183: CWE-434 Unrestricted Upload of File with Dangerous Type in IBM watsonx.data

0
Low
VulnerabilityCVE-2025-36183cvecve-2025-36183cwe-434
Published: Tue Feb 17 2026 (02/17/2026, 21:32:26 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: watsonx.data

Description

IBM watsonx.data 2.2 through 2.2.1 IBM Lakehouse could allow a privileged user to upload malicious files that could be executed server to modify limited files or data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/25/2026, 00:10:28 UTC

Technical Analysis

CVE-2025-36183 affects IBM watsonx.data versions 2.2 through 2.2.1, specifically the IBM Lakehouse component. The vulnerability arises from improper validation and restriction on file uploads by privileged users, allowing them to upload files with dangerous types that the system may execute on the server. This can lead to unauthorized modification of files or data within the application environment. The root cause is an unrestricted file upload flaw (CWE-434), where the system fails to enforce adequate checks on file types or content before accepting uploads. Exploitation requires the attacker to have privileged access to the system, meaning they must already have elevated permissions within the environment. No user interaction is necessary once the attacker has these privileges. The vulnerability impacts the integrity and availability of data and system files, as malicious files could alter or disrupt normal operations. The CVSS v3.1 score is 3.8 (low severity), reflecting the limited scope and required privileges for exploitation. No public exploits or patches are currently available, and IBM has reserved the CVE since April 2025 with publication in February 2026.

Potential Impact

The primary impact of this vulnerability is on organizations using IBM watsonx.data Lakehouse versions 2.2 and 2.2.1, where privileged users could upload and execute malicious files. This could lead to unauthorized modification of critical files or data, potentially disrupting data integrity and availability. While the vulnerability does not allow remote exploitation without authentication, insider threats or compromised privileged accounts could leverage this flaw to escalate damage. The impact is limited by the requirement for privileged access, reducing the risk of widespread exploitation. However, organizations relying heavily on watsonx.data for sensitive data analytics and storage could face operational disruptions or data corruption. The absence of known exploits reduces immediate risk, but the vulnerability could be targeted in future attacks once exploit code becomes available. The impact on confidentiality is minimal as the vulnerability does not directly expose data but could indirectly affect data integrity and availability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict access controls and monitoring for privileged users within IBM watsonx.data environments. Limit the number of privileged accounts and enforce the principle of least privilege to reduce the risk of misuse. Implement file upload restrictions and validation mechanisms externally if possible, such as scanning uploaded files for malicious content before acceptance. Monitor logs for unusual file upload activities or modifications to critical files. Employ network segmentation to isolate watsonx.data servers from less trusted networks and users. Stay informed on IBM security advisories for patches or updates addressing this vulnerability and apply them promptly once available. Consider deploying application-layer firewalls or endpoint protection solutions that can detect and block malicious file execution. Conduct regular security audits and penetration testing focused on privileged user actions and file upload functionalities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:23.419Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994e1f780d747be20dad4a5

Added to database: 2/17/2026, 9:47:35 PM

Last enriched: 2/25/2026, 12:10:28 AM

Last updated: 4/6/2026, 6:38:28 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses