CVE-2025-13687
Published: 03 March 2026
Summary
CVE-2025-13687 is a medium-severity OS Command Injection (CWE-78) vulnerability in Ibm Datastage On Cloud Pak For Data. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection (CWE-78) directly enables arbitrary Unix shell command execution (T1059.004) by an authenticated remote user; network-accessible application component matches T1190.
NVD Description
IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the user-defined function component.
Deeper analysisAI
CVE-2025-13687 is an OS command injection vulnerability (CWE-78) in IBM DataStage on Cloud Pak for Data versions 5.1.2 through 5.3.0. It arises from improper validation of user-supplied input in the user-defined function component, which could allow an authenticated user to execute arbitrary commands on the system with normal user privileges. The vulnerability has a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, and low impacts across confidentiality, integrity, and availability.
An authenticated user with low privileges (PR:L) can exploit this vulnerability remotely over the network without user interaction. By supplying malicious input through the user-defined function component, the attacker can execute arbitrary commands, potentially leading to limited data exposure, modification, or disruption on the affected system, all under the context of normal user privileges.
IBM has published an advisory with remediation details at https://www.ibm.com/support/pages/node/7262347, published on 2026-03-03. Security practitioners should consult this reference for patch availability and mitigation guidance specific to the affected Cloud Pak for Data releases.
Details
- CWE(s)