Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36357: CWE-36 in IBM IBM Planning Analytics Local

0
High
VulnerabilityCVE-2025-36357cvecve-2025-36357cwe-36
Published: Mon Nov 17 2025 (11/17/2025, 20:07:00 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: IBM Planning Analytics Local

Description

IBM Planning Analytics Local 2.1.0 through 2.1.14 could allow a remote authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing absolute path sequences to view, read, or write arbitrary files on the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:05:53 UTC

Technical Analysis

CVE-2025-36357 is a directory traversal vulnerability classified under CWE-36 affecting IBM Planning Analytics Local versions 2.1.0 through 2.1.14. The flaw allows a remote attacker with valid authentication to send specially crafted URL requests containing absolute path sequences that bypass intended directory access controls. This enables the attacker to traverse the file system hierarchy and potentially view, read, or write arbitrary files on the host system. The vulnerability arises from insufficient validation or sanitization of user-supplied path input in the web interface or API endpoints of IBM Planning Analytics Local. The CVSS v3.1 score of 8.0 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement for privileges and user interaction. Although no public exploits have been reported yet, the vulnerability presents a serious risk due to the sensitive nature of data managed by IBM Planning Analytics Local, which is used for enterprise planning and analytics. Attackers exploiting this vulnerability could access sensitive configuration files, credentials, or modify critical files, potentially leading to data breaches, unauthorized system control, or denial of service. The vulnerability was reserved in April 2025 and published in November 2025, but no patch links are currently available, indicating that remediation may still be pending or in progress.

Potential Impact

The impact of CVE-2025-36357 is significant for organizations using IBM Planning Analytics Local, as it compromises the confidentiality, integrity, and availability of critical business data and system files. Unauthorized file read/write access could lead to exposure of sensitive financial and planning data, manipulation of analytics results, or disruption of business operations. Attackers could leverage this vulnerability to implant malicious files, escalate privileges, or disrupt service availability. Given that IBM Planning Analytics Local is often deployed in enterprise environments handling strategic planning and financial data, exploitation could result in severe financial losses, regulatory compliance violations, and reputational damage. The requirement for authentication and user interaction somewhat limits exploitation to insiders or compromised accounts, but the low complexity and high impact make it a critical concern. Organizations with remote access to the affected systems are particularly vulnerable to targeted attacks exploiting this flaw.

Mitigation Recommendations

To mitigate CVE-2025-36357, organizations should immediately review and restrict user permissions to the minimum necessary, especially for users with remote access to IBM Planning Analytics Local. Network segmentation and firewall rules should limit access to the management interfaces to trusted hosts only. Implement strict input validation and URL filtering at the web server or application gateway level to detect and block path traversal patterns in requests. Monitor logs for suspicious URL requests containing absolute path sequences or unusual file access patterns. Until an official patch is released, consider isolating vulnerable instances from the internet or untrusted networks. Employ multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly back up critical data and configuration files to enable recovery in case of unauthorized modification. Stay informed through IBM security advisories for patch availability and apply updates promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:54.209Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b821c26779d9a5ea959fe

Added to database: 11/17/2025, 8:14:20 PM

Last enriched: 2/27/2026, 5:05:53 AM

Last updated: 3/22/2026, 2:50:53 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses