CVE-2025-13491
Unknown Unknown - Not Provided
Untrusted Search Path Allows Unauthorized Access in IBM App Connect

Publication date: 2026-02-05

Last updated on: 2026-03-16

Assigner: IBM Corporation

Description
IBM App Connect Enterprise Certified Container CD: 11.2.0 through 11.6.0, 12.1.0 through 12.19.0 and 12.0 LTS: 12.0.0 through 12.0.19 could allow an attacker to access sensitive files or modify configurations due to an untrusted search path.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-03-16
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
ibm app_connect_enterprise_certified_container to 12.19.0 (inc)
ibm app_connect_operator From 11.2.0 (inc) to 11.6.0 (inc)
ibm app_connect_operator From 12.1.0 (inc) to 12.19.0 (inc)
ibm app_connect_enterprise_certified_containers_operands_cd From 12.0.11.1-r1 (inc) to 12.0.12.5-r1 (inc)
ibm app_connect_enterprise_certified_containers_operands_lts From 12.0.12-r1 (inc) to 12.0.12-r19 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-426 The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-13491 is a vulnerability in IBM App Connect Enterprise Certified Container and related components caused by an untrusted search path (CWE-426). This means that the software does not properly protect the paths it uses to find files, which could allow an attacker with local access to access sensitive files or modify configuration settings.

The issue arises from insufficient write protection on files within the mapping assistance image, which can lead to a loss of confidentiality and integrity.


How can this vulnerability impact me? :

This vulnerability can allow a local attacker to access sensitive files or modify configuration files without needing any privileges or user interaction.

  • Loss of confidentiality due to unauthorized access to sensitive files.
  • Loss of integrity by unauthorized modification of configuration files.

The CVSS score of 5.1 indicates a moderate severity with low attack complexity and no required privileges, but the impact is limited to confidentiality and integrity with no impact on availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate the vulnerability in IBM App Connect Enterprise Certified Container, you should upgrade affected components to fixed versions.

  • For Continuous Delivery versions up to 12.19.0, upgrade the App Connect Enterprise Certified Container Operator to version 12.20.0 or higher.
  • Ensure all DesignerAuthoring components are at version 13.0.6.1-r1 or higher.
  • For Long Term Support versions 12.0.x, upgrade the Operator to version 12.0.20 or higher.
  • Ensure DesignerAuthoring components are at 12.0.12-r20 or higher.

As a workaround, disabling mapping assistance in the DesignerAuthoring component can help mitigate the vulnerability until upgrades are applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart