CVE-2025-13691
Information Disclosure in IBM DataStage on Cloud Pak for Data
Publication date: 2026-02-17
Last updated on: 2026-02-20
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | datastage_on_cloud_pak_for_data | From 5.1.2 (inc) to 5.3.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-13691 affects IBM DataStage on Cloud Pak for Data versions 5.1.2 through 5.3.0. The vulnerability arises from the HTTP processing component during request handling, which causes sensitive information to be returned in HTTP responses.
This exposure of sensitive system information can enable attackers to impersonate other users within the system.
It is classified under CWE-497, indicating exposure of sensitive system information to an unauthorized control sphere.
How can this vulnerability impact me? :
The vulnerability allows attackers to obtain sensitive information from HTTP responses, which can be used to impersonate other users in the system.
This can lead to unauthorized access and actions performed under the guise of legitimate users, compromising confidentiality and integrity of the system.
The CVSS v3.1 base score of 8.1 reflects a high impact on confidentiality and integrity, with a network attack vector and low attack complexity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection methods or commands provided to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
IBM strongly recommends remediating this vulnerability by upgrading affected IBM DataStage on Cloud Pak for Data installations to version 5.3.1 or later.
No workarounds or mitigations are provided for this vulnerability.