CVE-2025-36001
BaseFortify
Publication date: 2026-01-30
Last updated on: 2026-02-05
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | db2 | From 11.5.0 (inc) to 11.5.9 (inc) |
| ibm | db2 | From 11.5.0 (inc) to 11.5.9 (inc) |
| ibm | db2 | From 11.5.0 (inc) to 11.5.9 (inc) |
| ibm | db2 | From 12.1.0 (inc) to 12.1.3 (inc) |
| ibm | db2 | From 12.1.0 (inc) to 12.1.3 (inc) |
| ibm | db2 | From 12.1.0 (inc) to 12.1.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM Db2 for Linux, UNIX, and Windows allows an authenticated user to cause a denial of service by submitting a specially crafted SQL statement that includes XML with uncontrolled recursion. This means the system can be overwhelmed or crash due to excessive recursive processing triggered by the malicious input.
How can this vulnerability impact me? :
The vulnerability can impact you by causing a denial of service (DoS) condition on the affected IBM Db2 systems. This means that legitimate users may be unable to access the database services because the system resources are exhausted or the service is disrupted due to the uncontrolled recursion in the SQL/XML processing.