CVE-2025-36357: CWE-36 in IBM IBM Planning Analytics Local
IBM Planning Analytics Local 2.1.0 through 2.1.14 could allow a remote authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing absolute path sequences to view, read, or write arbitrary files on the system.
AI Analysis
Technical Summary
CVE-2025-36357 is a directory traversal vulnerability classified under CWE-36 affecting IBM Planning Analytics Local versions 2.1.0 through 2.1.14. The flaw allows a remote attacker with valid authentication to send specially crafted URL requests containing absolute path sequences that bypass intended directory access controls. This enables the attacker to traverse the file system hierarchy and potentially view, read, or write arbitrary files on the host system. The vulnerability arises from insufficient validation or sanitization of user-supplied path input in the web interface or API endpoints of IBM Planning Analytics Local. The CVSS v3.1 score of 8.0 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement for privileges and user interaction. Although no public exploits have been reported yet, the vulnerability presents a serious risk due to the sensitive nature of data managed by IBM Planning Analytics Local, which is used for enterprise planning and analytics. Attackers exploiting this vulnerability could access sensitive configuration files, credentials, or modify critical files, potentially leading to data breaches, unauthorized system control, or denial of service. The vulnerability was reserved in April 2025 and published in November 2025, but no patch links are currently available, indicating that remediation may still be pending or in progress.
Potential Impact
The impact of CVE-2025-36357 is significant for organizations using IBM Planning Analytics Local, as it compromises the confidentiality, integrity, and availability of critical business data and system files. Unauthorized file read/write access could lead to exposure of sensitive financial and planning data, manipulation of analytics results, or disruption of business operations. Attackers could leverage this vulnerability to implant malicious files, escalate privileges, or disrupt service availability. Given that IBM Planning Analytics Local is often deployed in enterprise environments handling strategic planning and financial data, exploitation could result in severe financial losses, regulatory compliance violations, and reputational damage. The requirement for authentication and user interaction somewhat limits exploitation to insiders or compromised accounts, but the low complexity and high impact make it a critical concern. Organizations with remote access to the affected systems are particularly vulnerable to targeted attacks exploiting this flaw.
Mitigation Recommendations
To mitigate CVE-2025-36357, organizations should immediately review and restrict user permissions to the minimum necessary, especially for users with remote access to IBM Planning Analytics Local. Network segmentation and firewall rules should limit access to the management interfaces to trusted hosts only. Implement strict input validation and URL filtering at the web server or application gateway level to detect and block path traversal patterns in requests. Monitor logs for suspicious URL requests containing absolute path sequences or unusual file access patterns. Until an official patch is released, consider isolating vulnerable instances from the internet or untrusted networks. Employ multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly back up critical data and configuration files to enable recovery in case of unauthorized modification. Stay informed through IBM security advisories for patch availability and apply updates promptly once released.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Switzerland, Singapore
CVE-2025-36357: CWE-36 in IBM IBM Planning Analytics Local
Description
IBM Planning Analytics Local 2.1.0 through 2.1.14 could allow a remote authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing absolute path sequences to view, read, or write arbitrary files on the system.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36357 is a directory traversal vulnerability classified under CWE-36 affecting IBM Planning Analytics Local versions 2.1.0 through 2.1.14. The flaw allows a remote attacker with valid authentication to send specially crafted URL requests containing absolute path sequences that bypass intended directory access controls. This enables the attacker to traverse the file system hierarchy and potentially view, read, or write arbitrary files on the host system. The vulnerability arises from insufficient validation or sanitization of user-supplied path input in the web interface or API endpoints of IBM Planning Analytics Local. The CVSS v3.1 score of 8.0 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement for privileges and user interaction. Although no public exploits have been reported yet, the vulnerability presents a serious risk due to the sensitive nature of data managed by IBM Planning Analytics Local, which is used for enterprise planning and analytics. Attackers exploiting this vulnerability could access sensitive configuration files, credentials, or modify critical files, potentially leading to data breaches, unauthorized system control, or denial of service. The vulnerability was reserved in April 2025 and published in November 2025, but no patch links are currently available, indicating that remediation may still be pending or in progress.
Potential Impact
The impact of CVE-2025-36357 is significant for organizations using IBM Planning Analytics Local, as it compromises the confidentiality, integrity, and availability of critical business data and system files. Unauthorized file read/write access could lead to exposure of sensitive financial and planning data, manipulation of analytics results, or disruption of business operations. Attackers could leverage this vulnerability to implant malicious files, escalate privileges, or disrupt service availability. Given that IBM Planning Analytics Local is often deployed in enterprise environments handling strategic planning and financial data, exploitation could result in severe financial losses, regulatory compliance violations, and reputational damage. The requirement for authentication and user interaction somewhat limits exploitation to insiders or compromised accounts, but the low complexity and high impact make it a critical concern. Organizations with remote access to the affected systems are particularly vulnerable to targeted attacks exploiting this flaw.
Mitigation Recommendations
To mitigate CVE-2025-36357, organizations should immediately review and restrict user permissions to the minimum necessary, especially for users with remote access to IBM Planning Analytics Local. Network segmentation and firewall rules should limit access to the management interfaces to trusted hosts only. Implement strict input validation and URL filtering at the web server or application gateway level to detect and block path traversal patterns in requests. Monitor logs for suspicious URL requests containing absolute path sequences or unusual file access patterns. Until an official patch is released, consider isolating vulnerable instances from the internet or untrusted networks. Employ multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly back up critical data and configuration files to enable recovery in case of unauthorized modification. Stay informed through IBM security advisories for patch availability and apply updates promptly once released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:54.209Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691b821c26779d9a5ea959fe
Added to database: 11/17/2025, 8:14:20 PM
Last enriched: 2/27/2026, 5:05:53 AM
Last updated: 3/22/2026, 2:50:53 AM
Views: 129
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.