Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36299: CWE-540 in IBM IBM Planning Analytics Local

0
Medium
VulnerabilityCVE-2025-36299cvecve-2025-36299cwe-540
Published: Mon Nov 17 2025 (11/17/2025, 20:09:35 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: IBM Planning Analytics Local

Description

IBM Planning Analytics Local 2.1.0 through 2.1.14 stores sensitive information in source code could be used in further attacks against the system.

AI-Powered Analysis

AILast updated: 11/17/2025, 20:15:21 UTC

Technical Analysis

CVE-2025-36299 is a vulnerability identified in IBM Planning Analytics Local versions 2.1.0 through 2.1.14, categorized under CWE-540, which pertains to the storage of sensitive information in source code. This flaw arises when sensitive data such as credentials, keys, or configuration secrets are embedded directly within the source code files rather than being securely managed through environment variables or secure vaults. Attackers who gain access to the source code repository or deployment environment can extract this sensitive information, potentially enabling further attacks such as privilege escalation, lateral movement, or unauthorized data access. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network (remote exploitation), low attack complexity, and requiring privileges but no user interaction. The scope is unchanged, and the impact is limited to confidentiality loss without affecting integrity or availability. Although no public exploits are currently known, the presence of sensitive information in source code is a recognized security risk that can facilitate more severe attacks if combined with other vulnerabilities or insider threats. IBM has not yet published patches for this issue, so organizations must rely on mitigating controls until updates are available.

Potential Impact

For European organizations, especially those in finance, consulting, and analytics sectors that rely on IBM Planning Analytics Local, this vulnerability poses a risk to the confidentiality of sensitive business data and credentials. Exploitation could lead to unauthorized access to internal systems, enabling attackers to move laterally within networks or exfiltrate sensitive information. This could result in regulatory compliance violations under GDPR due to potential data breaches, reputational damage, and financial losses. The medium severity rating reflects that while the vulnerability alone may not cause immediate disruption, it can be a stepping stone for more damaging attacks. Organizations with multi-tenant environments or those integrating IBM Planning Analytics with other critical systems may face compounded risks. The lack of known exploits reduces immediate threat but does not eliminate the risk, especially from insider threats or targeted attacks.

Mitigation Recommendations

Organizations should immediately audit their IBM Planning Analytics Local deployments to identify any instances of sensitive information stored in source code. Until IBM releases official patches, the following specific actions are recommended: 1) Remove or refactor any hardcoded sensitive data from source code and replace it with secure secret management solutions such as HashiCorp Vault, Azure Key Vault, or AWS Secrets Manager. 2) Restrict access to source code repositories and deployment environments using strict role-based access controls and multi-factor authentication. 3) Conduct thorough code reviews and automated scans to detect embedded secrets using tools like GitGuardian or TruffleHog. 4) Monitor network and system logs for unusual access patterns that could indicate exploitation attempts. 5) Educate development and operations teams on secure coding practices to prevent recurrence. 6) Prepare for patch deployment by establishing a rapid update process once IBM releases fixes. 7) Consider network segmentation to limit the impact of potential breaches involving IBM Planning Analytics Local systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:48.650Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b821c26779d9a5ea959fb

Added to database: 11/17/2025, 8:14:20 PM

Last enriched: 11/17/2025, 8:15:21 PM

Last updated: 11/18/2025, 6:05:36 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats