Cyber Posture

CVE-2025-13616

Medium

Published: 03 March 2026

Published
03 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 13.3th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13616 is a medium-severity Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) vulnerability in Ibm Datastage On Cloud Pak For Data. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-497

Ongoing reviews detect and remove sensitive system information before it reaches publicly accessible systems.

addresses: CWE-497

Employs detection to prevent unauthorized mining of sensitive system information from being exfiltrated to external control spheres.

addresses: CWE-497

Documenting where system information is processed and stored prevents exposure to unauthorized control spheres.

addresses: CWE-497

The control stops sensitive system information from crossing into unauthorized control spheres through EM emanations.

addresses: CWE-497

Authorization and minimization requirements keep PII out of test/research control spheres that often lack production-grade protections.

addresses: CWE-497

Documented categorization of system information reduces the chance that sensitive internals are left exposed to unauthorized spheres.

addresses: CWE-497

System information is concealed or replaced with decoys, reducing leakage to unauthorized observers.

addresses: CWE-497

Ensures sensitive system information is not disclosed outside the intended control sphere through error output.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability directly enables remote retrieval of sensitive data via HTTP (T1005) from an exposed application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used in further attacks against the system.

Deeper analysisAI

CVE-2025-13616 is an information disclosure vulnerability in IBM DataStage on Cloud Pak for Data versions 5.1.2 through 5.3.0. The flaw occurs when the software returns sensitive information in an HTTP response, which could aid attackers in subsequent exploitation of the system. It is classified under CWE-497 (Exposure of Sensitive Information to an Unauthorized Actor) with a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), indicating medium severity primarily due to high confidentiality impact.

The vulnerability can be exploited over the network by an authenticated attacker with low privileges. No user interaction is required, and low attack complexity enables remote exploitation without changing the scope. Successful exploitation grants access to sensitive data via the HTTP response, which could be leveraged for further attacks against the system, though it does not directly impact integrity or availability.

IBM has published a security bulletin detailing the issue and remediation steps at https://www.ibm.com/support/pages/node/7261771. Security practitioners should consult this advisory for patch availability and mitigation guidance specific to affected Cloud Pak for Data deployments.

Details

CWE(s)

Affected Products

ibm
datastage on cloud pak for data
5.1.2 — 5.3.1

CVEs Like This One

CVE-2025-13691Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13688Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13686Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13687Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13689Same product: Ibm Datastage On Cloud Pak For Data
CVE-2024-56340Same vendor: Ibm
CVE-2025-0162Same vendor: Ibm
CVE-2026-1567Same vendor: Ibm
CVE-2025-13096Same vendor: Ibm
CVE-2024-41771Same vendor: Ibm

References