Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36357: CWE-36 in IBM IBM Planning Analytics Local

0
High
VulnerabilityCVE-2025-36357cvecve-2025-36357cwe-36
Published: Mon Nov 17 2025 (11/17/2025, 20:07:00 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: IBM Planning Analytics Local

Description

IBM Planning Analytics Local 2.1.0 through 2.1.14 could allow a remote authenticated user to traverse directories on the system. An attacker could send a specially crafted URL request containing absolute path sequences to view, read, or write arbitrary files on the system.

AI-Powered Analysis

AILast updated: 11/24/2025, 20:21:58 UTC

Technical Analysis

CVE-2025-36357 is a directory traversal vulnerability classified under CWE-36 affecting IBM Planning Analytics Local versions 2.1.0 through 2.1.14. This vulnerability allows a remote attacker with valid authentication to manipulate URL requests by including absolute path sequences, thereby bypassing normal directory access restrictions. Through this technique, the attacker can access arbitrary files on the underlying system, potentially reading sensitive data or modifying critical files. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized file access can lead to data leakage, unauthorized changes, or disruption of services. The CVSS 3.1 base score of 8.0 indicates a high severity, with attack vector being network-based, low attack complexity, requiring privileges (authenticated user), and user interaction. The scope is unchanged, meaning the vulnerability affects only the vulnerable component. No public exploits have been reported yet, but the presence of authentication and user interaction requirements somewhat limits immediate exploitation risk. However, given the critical nature of the data handled by IBM Planning Analytics Local in enterprise environments, exploitation could have severe consequences. The vulnerability was publicly disclosed in November 2025, with no patch links currently available, emphasizing the need for proactive mitigation. The vulnerability arises from insufficient validation of user-supplied input in URL parameters, allowing traversal sequences to escape intended directories.

Potential Impact

For European organizations, especially those in finance, government, and large enterprises relying on IBM Planning Analytics Local, this vulnerability poses a significant risk. Unauthorized file access could lead to exposure of sensitive financial data, strategic planning documents, or personally identifiable information, violating GDPR and other data protection regulations. Integrity compromise could allow attackers to alter planning data, leading to erroneous business decisions or financial losses. Availability impacts could arise if critical files are overwritten or deleted, disrupting business operations. The requirement for authentication and user interaction reduces the risk of widespread automated exploitation but does not eliminate insider threats or targeted attacks. Given IBM Planning Analytics Local’s role in business intelligence and planning, exploitation could undermine organizational trust and cause regulatory penalties. The lack of public exploits currently provides a window for mitigation, but organizations must act swiftly to prevent potential exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict access to IBM Planning Analytics Local to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 2) Apply the principle of least privilege by limiting user permissions to only those necessary for their roles, minimizing the risk of exploitation by authenticated users. 3) Monitor web server logs and application logs for suspicious URL patterns containing directory traversal sequences (e.g., ../ or absolute paths) to detect potential exploitation attempts. 4) Employ web application firewalls (WAFs) with rules designed to detect and block directory traversal attacks targeting IBM Planning Analytics Local. 5) Segregate the IBM Planning Analytics Local environment from other critical infrastructure to contain potential breaches. 6) Regularly check IBM’s security advisories for patches or updates addressing this vulnerability and apply them promptly once available. 7) Conduct user awareness training to reduce the risk of social engineering that could facilitate user interaction required for exploitation. 8) Perform periodic security assessments and penetration testing focusing on directory traversal and input validation weaknesses in the affected application.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:54.209Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b821c26779d9a5ea959fe

Added to database: 11/17/2025, 8:14:20 PM

Last enriched: 11/24/2025, 8:21:58 PM

Last updated: 1/7/2026, 8:48:43 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats