Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
IBM strongly recommends addressing the vulnerability now by upgrading DataStage on Cloud Pak for Data. Product(s)Version(s) number and/or range Remediation/Fix/InstructionsDataStage on Cloud Pak for Data5.1.2-5.3.0 Upgrade to version 5.3.1 and beyond. https://www.ibm.com/docs/en/software-hub/5.1.x
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7259958 |
|
Fri, 20 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ibm datastage On Cloud Pak For Data
|
|
| CPEs | cpe:2.3:a:ibm:datastage_on_cloud_pak_for_data:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ibm datastage On Cloud Pak For Data
|
Wed, 18 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads. | |
| Title | DataStage on Cloud Pak for Data is vulnerable to arbitrary code injection due to runtime environment | |
| First Time appeared |
Ibm
Ibm datastage On Cloud Pak |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:ibm:datastage_on_cloud_pak:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ibm
Ibm datastage On Cloud Pak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-02-26T14:44:18.740Z
Reserved: 2025-11-25T20:23:12.728Z
Link: CVE-2025-13689
Updated: 2026-02-18T20:42:35.568Z
Status : Analyzed
Published: 2026-02-17T23:16:18.740
Modified: 2026-02-20T16:47:33.860
Link: CVE-2025-13689
No data.
OpenCVE Enrichment
Updated: 2026-02-18T10:33:07Z