CVE-2026-2475: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in IBM Verify Identity Access Container
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted request to redirect a victim to arbitrary Web sites.
AI Analysis
Technical Summary
CVE-2026-2475 is classified as a CWE-601 open redirect vulnerability affecting IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1. The vulnerability arises because the affected software improperly validates or sanitizes URL parameters used for redirection, allowing attackers to craft URLs that redirect users to arbitrary external sites. This can be exploited remotely without authentication but requires user interaction, such as clicking a malicious link. The primary risk is that attackers can leverage this flaw to conduct phishing campaigns, redirecting users to malicious websites that may attempt credential theft or malware delivery. The CVSS 3.1 base score is 3.1, reflecting network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and low integrity impact. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed proactively. The vulnerability affects enterprise environments where IBM Verify Identity Access Container is deployed for identity and access management, potentially exposing users to social engineering attacks.
Potential Impact
The primary impact of CVE-2026-2475 is an increased risk of successful phishing and social engineering attacks against organizations using the affected IBM Verify Identity Access Container products. Attackers can exploit the open redirect to lure users into visiting malicious websites that may harvest credentials, deliver malware, or conduct further attacks. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations with large user bases or those in regulated industries may face reputational damage and compliance issues if phishing attacks succeed. The requirement for user interaction and high attack complexity limits widespread automated exploitation, but targeted attacks against high-value users remain a concern. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.
Mitigation Recommendations
Since no patches are currently available, organizations should implement compensating controls to mitigate the risk of exploitation. These include: 1) Educating users about the risks of clicking on unsolicited or suspicious links, emphasizing verification of URLs before interaction. 2) Implementing URL filtering and web gateway controls to detect and block known malicious domains and suspicious redirect patterns. 3) Monitoring web server logs for unusual redirect requests or patterns indicative of exploitation attempts. 4) Configuring the IBM Verify Identity Access Container to restrict or validate redirect URLs if configuration options exist. 5) Employing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. 6) Keeping abreast of IBM security advisories for forthcoming patches or updates addressing this vulnerability. 7) Using email security solutions that detect and quarantine phishing emails leveraging open redirects. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and environment.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, India, Brazil
CVE-2026-2475: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in IBM Verify Identity Access Container
Description
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted request to redirect a victim to arbitrary Web sites.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2475 is classified as a CWE-601 open redirect vulnerability affecting IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1. The vulnerability arises because the affected software improperly validates or sanitizes URL parameters used for redirection, allowing attackers to craft URLs that redirect users to arbitrary external sites. This can be exploited remotely without authentication but requires user interaction, such as clicking a malicious link. The primary risk is that attackers can leverage this flaw to conduct phishing campaigns, redirecting users to malicious websites that may attempt credential theft or malware delivery. The CVSS 3.1 base score is 3.1, reflecting network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or availability impact, and low integrity impact. No patches or exploits are currently known, but the vulnerability is publicly disclosed and should be addressed proactively. The vulnerability affects enterprise environments where IBM Verify Identity Access Container is deployed for identity and access management, potentially exposing users to social engineering attacks.
Potential Impact
The primary impact of CVE-2026-2475 is an increased risk of successful phishing and social engineering attacks against organizations using the affected IBM Verify Identity Access Container products. Attackers can exploit the open redirect to lure users into visiting malicious websites that may harvest credentials, deliver malware, or conduct further attacks. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations with large user bases or those in regulated industries may face reputational damage and compliance issues if phishing attacks succeed. The requirement for user interaction and high attack complexity limits widespread automated exploitation, but targeted attacks against high-value users remain a concern. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure increases attacker awareness.
Mitigation Recommendations
Since no patches are currently available, organizations should implement compensating controls to mitigate the risk of exploitation. These include: 1) Educating users about the risks of clicking on unsolicited or suspicious links, emphasizing verification of URLs before interaction. 2) Implementing URL filtering and web gateway controls to detect and block known malicious domains and suspicious redirect patterns. 3) Monitoring web server logs for unusual redirect requests or patterns indicative of exploitation attempts. 4) Configuring the IBM Verify Identity Access Container to restrict or validate redirect URLs if configuration options exist. 5) Employing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. 6) Keeping abreast of IBM security advisories for forthcoming patches or updates addressing this vulnerability. 7) Using email security solutions that detect and quarantine phishing emails leveraging open redirects. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2026-02-13T15:48:57.782Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cd8944e6bfc5ba1dfc32df
Added to database: 4/1/2026, 9:08:20 PM
Last enriched: 4/1/2026, 9:24:35 PM
Last updated: 4/6/2026, 4:39:00 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.