CVE-2025-25048
BaseFortify
Publication date: 2025-09-04
Last updated on: 2025-12-02
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.2 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.0.3 |
| ibm | jazz_foundation | 7.1.0 |
| ibm | jazz_foundation | 7.1.0 |
| ibm | jazz_foundation | 7.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM Jazz Foundation versions 7.0.2 through 7.1.0 allows an authenticated user to upload files to the system improperly. It occurs because the system does not correctly neutralize sequences that can resolve to a restricted directory, potentially enabling unauthorized file uploads.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an authenticated user to upload files to restricted directories, which could lead to unauthorized modification or insertion of files. This may compromise the integrity of the system, potentially allowing malicious files to be placed where they should not be.