Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2475: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in IBM Verify Identity Access Container

0
Low
VulnerabilityCVE-2026-2475cvecve-2026-2475cwe-601
Published: Wed Apr 01 2026 (04/01/2026, 20:56:21 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Verify Identity Access Container

Description

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted request to redirect a victim to arbitrary Web sites.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:24:35 UTC

Technical Analysis

CVE-2026-2475 is classified as a CWE-601 open redirect vulnerability affecting IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1. The vulnerability arises because the affected software improperly validates or sanitizes URL parameters used for redirection, allowing attackers to craft URLs that redirect users to arbitrary external sites. This can be exploited remotely without authentication but requires user interaction, such as clicking a malicious link. The primary risk is that attackers can leverage this flaw to conduct phishing campaigns, redirecting users to malicious websites that may attempt credential theft or malware delivery. The CVSS 3.1 base score is 3.1, reflecting network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and low integrity impact. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed proactively. The vulnerability affects enterprise environments where IBM Verify Identity Access Container is deployed for identity and access management, potentially exposing users to social engineering attacks.

Potential Impact

The primary impact of CVE-2026-2475 is an increased risk of successful phishing and social engineering attacks against organizations using the affected IBM Verify Identity Access Container products. Attackers can exploit the open redirect to lure users into visiting malicious websites that may harvest credentials, deliver malware, or conduct further attacks. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations with large user bases or those in regulated industries may face reputational damage and compliance issues if phishing attacks succeed. The requirement for user interaction and high attack complexity limits widespread automated exploitation, but targeted attacks against high-value users remain a concern. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.

Mitigation Recommendations

Since no patches are currently available, organizations should implement compensating controls to mitigate the risk of exploitation. These include: 1) Educating users about the risks of clicking on unsolicited or suspicious links, emphasizing verification of URLs before interaction. 2) Implementing URL filtering and web gateway controls to detect and block known malicious domains and suspicious redirect patterns. 3) Monitoring web server logs for unusual redirect requests or patterns indicative of exploitation attempts. 4) Configuring the IBM Verify Identity Access Container to restrict or validate redirect URLs if configuration options exist. 5) Employing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. 6) Keeping abreast of IBM security advisories for forthcoming patches or updates addressing this vulnerability. 7) Using email security solutions that detect and quarantine phishing emails leveraging open redirects. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2026-02-13T15:48:57.782Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cd8944e6bfc5ba1dfc32df

Added to database: 4/1/2026, 9:08:20 PM

Last enriched: 4/1/2026, 9:24:35 PM

Last updated: 4/6/2026, 4:39:00 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses