Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36243: CWE-918 Server-Side Request Forgery (SSRF) in IBM Concert

0
Medium
VulnerabilityCVE-2025-36243cvecve-2025-36243cwe-918
Published: Tue Feb 17 2026 (02/17/2026, 18:56:44 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Concert

Description

IBM Concert 1.0.0 through 2.1.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:22:23 UTC

Technical Analysis

CVE-2025-36243 is a Server-Side Request Forgery (SSRF) vulnerability identified in IBM Concert versions 1.0.0 through 2.1.0. SSRF vulnerabilities occur when an attacker can abuse a server to send crafted requests to unintended locations, often internal network resources that are otherwise inaccessible externally. In this case, the vulnerability allows an authenticated attacker with low privileges to induce the IBM Concert server to send unauthorized HTTP requests to arbitrary destinations. This can lead to network enumeration by probing internal IP ranges, accessing internal services, or leveraging trust relationships to facilitate further attacks such as data exfiltration or lateral movement. The vulnerability does not require user interaction but does require the attacker to have valid credentials, which may be obtained through phishing or credential stuffing. The CVSS v3.1 score of 5.4 reflects that the vulnerability has a network attack vector, low attack complexity, requires privileges, no user interaction, and impacts confidentiality and integrity to a limited extent, without affecting availability. No public exploits or patches are currently available, indicating that organizations must proactively implement mitigations. The vulnerability is categorized under CWE-918, which highlights weaknesses in server-side request handling that can be manipulated to send unauthorized requests.

Potential Impact

For European organizations, this SSRF vulnerability poses a moderate risk primarily to confidentiality and integrity of internal network resources. Exploitation could allow attackers to map internal networks, access sensitive internal services, or pivot to more critical systems, potentially leading to data breaches or disruption of business processes. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on IBM Concert for orchestration or automation are particularly at risk. The requirement for authentication limits the attack surface but does not eliminate risk, as credential compromise is common. The vulnerability could facilitate advanced persistent threats (APTs) by enabling stealthy internal reconnaissance and lateral movement. Additionally, the lack of available patches increases exposure time. The impact is heightened in environments with insufficient network segmentation or weak internal access controls.

Mitigation Recommendations

To mitigate CVE-2025-36243, European organizations should implement the following specific measures: 1) Restrict IBM Concert server's outbound network access using firewall rules or network segmentation to limit the ability to send arbitrary requests to internal or external systems. 2) Enforce strict input validation and sanitization on any user-controllable parameters that influence server-side requests to prevent injection of malicious URLs or payloads. 3) Implement robust authentication and monitoring to detect anomalous access patterns or unusual request behaviors indicative of SSRF exploitation attempts. 4) Conduct regular credential audits and enforce multi-factor authentication (MFA) to reduce the risk of attacker authentication. 5) Monitor IBM Concert logs for unusual outbound connections or errors related to request handling. 6) Stay alert for IBM security advisories and apply patches promptly once available. 7) Consider deploying web application firewalls (WAFs) with SSRF detection capabilities to block suspicious requests. 8) Review and tighten internal network segmentation to minimize the impact of any SSRF exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:43.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575bb80d747be2053771a

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 2/18/2026, 8:22:23 AM

Last updated: 2/21/2026, 12:16:57 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats