CVE-2025-13491
Untrusted Search Path Allows Unauthorized Access in IBM App Connect
Publication date: 2026-02-05
Last updated on: 2026-03-16
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | app_connect_enterprise_certified_container | to 12.19.0 (inc) |
| ibm | app_connect_operator | From 11.2.0 (inc) to 11.6.0 (inc) |
| ibm | app_connect_operator | From 12.1.0 (inc) to 12.19.0 (inc) |
| ibm | app_connect_enterprise_certified_containers_operands_cd | From 12.0.11.1-r1 (inc) to 12.0.12.5-r1 (inc) |
| ibm | app_connect_enterprise_certified_containers_operands_lts | From 12.0.12-r1 (inc) to 12.0.12-r19 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-426 | The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-13491 is a vulnerability in IBM App Connect Enterprise Certified Container and related components caused by an untrusted search path (CWE-426). This means that the software does not properly protect the paths it uses to find files, which could allow an attacker with local access to access sensitive files or modify configuration settings.
The issue arises from insufficient write protection on files within the mapping assistance image, which can lead to a loss of confidentiality and integrity.
How can this vulnerability impact me? :
This vulnerability can allow a local attacker to access sensitive files or modify configuration files without needing any privileges or user interaction.
- Loss of confidentiality due to unauthorized access to sensitive files.
- Loss of integrity by unauthorized modification of configuration files.
The CVSS score of 5.1 indicates a moderate severity with low attack complexity and no required privileges, but the impact is limited to confidentiality and integrity with no impact on availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability in IBM App Connect Enterprise Certified Container, you should upgrade affected components to fixed versions.
- For Continuous Delivery versions up to 12.19.0, upgrade the App Connect Enterprise Certified Container Operator to version 12.20.0 or higher.
- Ensure all DesignerAuthoring components are at version 13.0.6.1-r1 or higher.
- For Long Term Support versions 12.0.x, upgrade the Operator to version 12.0.20 or higher.
- Ensure DesignerAuthoring components are at 12.0.12-r20 or higher.
As a workaround, disabling mapping assistance in the DesignerAuthoring component can help mitigate the vulnerability until upgrades are applied.