EUVD-2025-209020

| CVE-2025-14915 MEDIUM
2026-03-25 ibm GHSA-c39w-6qgm-5cp7
6.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
EUVD ID Assigned
Mar 25, 2026 - 20:32 euvd
EUVD-2025-209020
Analysis Generated
Mar 25, 2026 - 20:32 vuln.today
Patch Released
Mar 25, 2026 - 20:32 nvd
Patch available
CVE Published
Mar 25, 2026 - 20:12 nvd
MEDIUM 6.5

Description

IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is affected by privilege escalation. A privileged user could gain additional access to the application server.

Analysis

IBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.3 are vulnerable to privilege escalation due to improper access control (CWE-200: Information Exposure). A privileged user with existing authenticated access to the application server can exploit this vulnerability to gain additional unauthorized access to sensitive resources, potentially leading to information disclosure and integrity violations. While a CVSS score of 6.5 indicates moderate severity, the vulnerability requires high privileges to trigger (PR:H) and has no user interaction requirement, making it exploitable by insiders or compromised administrative accounts.

Technical Context

The vulnerability resides in IBM WebSphere Application Server Liberty, a lightweight enterprise Java application server supporting Java EE and Jakarta EE standards. The affected versions span a wide range (17.0.0.3 to 26.0.0.3), indicating a regression or design flaw in the access control mechanisms that verify user permissions when accessing application server resources. CWE-200 (Information Exposure Through an Error Message) suggests the root cause involves improper validation or enforcement of role-based access control (RBAC), where authenticated users with one privilege level can escalate to higher privilege roles or access data outside their authorization scope. The network-accessible nature of WebSphere (AV:N) means this is remotely exploitable over standard HTTP/HTTPS ports used for administration consoles and remote management.

Affected Products

IBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.3 are affected, as identified by CPE cpe:2.3:a:ibm:websphere_application_server_-_liberty. This version range spans multiple major releases, including Liberty 17, 18, 19, 20, 21, 22, 23, 24, 25, and 26 up to their respective 0.3 patch levels. Organizations running any version within this range should inventory their deployments immediately. The vendor has published a security advisory with patch details at https://www.ibm.com/support/pages/node/7267345, which contains version-specific remediation guidance.

Remediation

Upgrade IBM WebSphere Application Server Liberty to a patched version released by IBM following security advisory node/7267345 available at https://www.ibm.com/support/pages/node/7267345. Contact IBM support to determine the appropriate patched version for your current deployment. Until patching is possible, enforce the principle of least privilege for administrative accounts by restricting the number of users with high-level permissions, implement multi-factor authentication for administrative console access, isolate WebSphere administration ports (typically 9443) to trusted internal networks only, and audit all administrative account activities via centralized logging. Implement network segmentation to prevent lateral movement if an administrative account is compromised. Schedule patching during a controlled maintenance window to minimize business disruption, testing patches in a staging environment first.

Priority Score

33
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0

Share

EUVD-2025-209020 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy