CVE-2025-13689
Unrestricted File Upload in IBM DataStage Enables Command Execution
Publication date: 2026-02-17
Last updated on: 2026-02-20
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | datastage_on_cloud_pak_for_data | From 5.1.2 (inc) to 5.3.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in IBM DataStage on Cloud Pak for Data allows an authenticated user to execute arbitrary commands and gain access to sensitive information. The root cause is unrestricted file uploads, which means the system does not properly restrict or validate files being uploaded, enabling malicious actions.
How can this vulnerability impact me? :
The impact of this vulnerability is severe. An attacker with valid authentication can execute arbitrary commands, potentially taking control of the system. They can also access sensitive information, leading to data breaches, loss of confidentiality, integrity, and availability of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know