Description
IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 IBM InfoSphere DataStage Flow Designer is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Published: 2026-03-25
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Apply Patch
AI Analysis

Impact

A vulnerability in IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 allows an attacker to forge requests that the target system will accept as legitimate. By leveraging the web interface of the DataStage Flow Designer component, an adversary could deliver authenticated requests on behalf of a user, potentially modifying data or executing actions without authorization.

Affected Systems

IBM Web-based product Information Server, specifically the InfoSphere DataStage Flow Designer component. Affected releases include versions 11.7.0.0 up to and including 11.7.1.6 across supported operating systems such as AIX, Linux, and Windows.

Risk and Exploitability

The CVSS base score of 4.3 indicates a moderate severity. Exploit probability is low, with an EPSS score below 1%. The vulnerability is not listed in the CISA KEV catalog. Attackers likely exploit the web interface remotely by sending crafted cross‑site requests; successful exploitation would enable unauthorized actions performed in the context of a trusted user, potentially compromising integrity and confidentiality of managed data.

Generated by OpenCVE AI on March 26, 2026 at 19:23 UTC.

Remediation

Vendor Solution

ProductVersion(s)APARRemediationIBM InfoSphere Information Server11.7.0.0 to 11.7.1.6 DT454212 https://www.ibm.com/mysupport/s/defect/aCIgJ0000006kUn/dt454212 --Apply IBM InfoSphere Information Server version  11.7.1.0 https://www.ibm.com/support/pages/node/878310   --Apply IBM InfoSphere Information Server version  11.7.1.6 https://www.ibm.com/support/pages/node/7182872 --Apply IBM InfoSphere Information Server  11.7.1.6 Service pack 2 https://www.ibm.com/support/pages/node/7260779


OpenCVE Recommended Actions

  • Apply IBM InfoSphere Information Server version 11.7.1.0
  • Apply IBM InfoSphere Information Server version 11.7.1.6
  • Apply IBM InfoSphere Information Server 11.7.1.6 Service pack 2

Generated by OpenCVE AI on March 26, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Ibm aix
Linux
Linux linux Kernel
Microsoft
Microsoft windows
CPEs cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Ibm aix
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Thu, 26 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 IBM InfoSphere DataStage Flow Designer is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Title IBM InfoSphere Information Server is vulnerable to cross-site request forgery
First Time appeared Ibm
Ibm infosphere Information Server
Weaknesses CWE-352
CPEs cpe:2.3:a:ibm:infosphere_information_server:11.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:infosphere_information_server:11.7.1.6:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm infosphere Information Server
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Ibm Aix Infosphere Information Server
Linux Linux Kernel
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-03-26T16:11:10.448Z

Reserved: 2025-04-15T21:17:02.754Z

Link: CVE-2025-36422

cve-icon Vulnrichment

Updated: 2026-03-26T16:11:07.871Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T21:16:25.093

Modified: 2026-03-26T18:17:08.843

Link: CVE-2025-36422

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:29:41Z

Weaknesses