CVE-2025-13734
Privilege Escalation in IBM DOORS Next 7.1/7.2 via Access Control Bypass
Publication date: 2026-03-03
Last updated on: 2026-03-04
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | engineering_requirements_management_doors_next | 7.1 |
| ibm | engineering_requirements_management_doors_next | 7.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability, identified as CVE-2025-13734, affects IBM Engineering Requirements Management DOORS Next versions 7.1 and 7.2. It allows an authenticated user to view and edit data beyond their authorized access permissions due to insufficient authorization enforcement (CWE-862: Missing Authorization). Essentially, a user with valid credentials can exploit this flaw to access and modify restricted project artifacts that they should not be able to.
How can this vulnerability impact me? :
The impact of this vulnerability includes potential compromise of data confidentiality and integrity. An attacker with valid credentials could view and edit restricted data, which may lead to unauthorized disclosure or alteration of sensitive project information. The CVSS score of 5.4 indicates a moderate severity with low attack complexity and no requirement for user interaction, meaning it can be exploited relatively easily over the network by someone with low privileges.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection methods or commands to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should promptly apply the corrective updates released by IBM.
- For IBM Engineering Requirements Management DOORS Next version 7.1, install ifix 08 or newer.
- For version 7.2, install ifix 01 or newer.
No workarounds or other mitigations are provided, so applying these updates is the recommended immediate action.