CVE-2025-36159
BaseFortify
Publication date: 2025-11-20
Last updated on: 2025-11-21
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | concert | From 1.0.0 (inc) to 2.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-117 | The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM Concert versions 1.0.0 through 2.0.0 allows a local user to forge log files. This means the user can manipulate log entries to impersonate other users or conceal their own identity because the software does not properly neutralize output before logging.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a local attacker to alter log files, which can lead to impersonation of other users or hiding malicious activities. This undermines the integrity of audit logs, making it difficult to detect unauthorized actions or trace accountability.