Cyber Posture

CVE-2025-13096

High

Published: 02 February 2026

Published
02 February 2026
Modified
12 February 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
EPSS Score 0.0009 24.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13096 is a high-severity SSRF (CWE-918) vulnerability in Ibm Business Automation Workflow. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-918

Penetration testing attempts server-side requests to internal resources, identifying SSRF weaknesses for remediation.

addresses: CWE-918

Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.

addresses: CWE-918

Validates server-side URLs and resource references to block SSRF attempts.

addresses: CWE-918

Detects server-side request forgery through monitoring of unexpected outbound connections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

XXE directly enables remote exploitation of a public-facing workflow app (T1190) for local file/system data disclosure (T1005) and limited DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007, V24.0.0 - V24.0.0-IF007 and IBM Business Automation Workflow traditional V25.0.0, V24.0.1, V24.0.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker…

more

could exploit this vulnerability to expose sensitive information or consume memory resources.

Deeper analysisAI

CVE-2025-13096 is an XML external entity injection (XXE) vulnerability, classified under CWE-918, affecting specific versions of IBM Business Automation Workflow. The impacted software includes IBM Business Automation Workflow containers from V25.0.0 through V25.0.0-IF007, V24.0.1 through V24.0.1-IF007, and V24.0.0 through V24.0.0-IF007, as well as IBM Business Automation Workflow traditional deployments at V25.0.0, V24.0.1, and V24.0.0. The flaw arises when the software processes XML data, enabling potential exploitation as scored at CVSS 7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L).

A remote attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. Successful exploitation allows the attacker to disclose sensitive information due to the high confidentiality impact (C:H) or cause limited denial of service through memory resource consumption (A:L), with no integrity impact.

IBM's security advisory provides details on mitigation and patches; refer to https://www.ibm.com/support/pages/node/7259321 for remediation guidance specific to the affected versions.

Details

CWE(s)

Affected Products

ibm
business automation workflow
24.0.0, 24.0.1, 25.0.0 · ≤ 24.0.0 · ≤ 24.0.0

CVEs Like This One

CVE-2026-1343Same vendor: Ibm
CVE-2024-41771Same vendor: Ibm
CVE-2025-0162Same vendor: Ibm
CVE-2024-56340Same vendor: Ibm
CVE-2026-1567Same vendor: Ibm
CVE-2025-13616Same vendor: Ibm
CVE-2025-12531Same vendor: Ibm
CVE-2024-49352Same vendor: Ibm
CVE-2023-49886Same vendor: Ibm
CVE-2023-38272Same vendor: Ibm

References