Cyber Posture

CVE-2025-13687

Medium

Published: 03 March 2026

Published
03 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0005 16.8th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13687 is a medium-severity OS Command Injection (CWE-78) vulnerability in Ibm Datastage On Cloud Pak For Data. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-78

Platform-independent apps typically execute inside a managed runtime or sandbox that restricts direct OS command execution, reducing the ability to exploit OS command injection.

addresses: CWE-78

Validates inputs to block special elements that would alter OS command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

OS command injection (CWE-78) directly enables arbitrary Unix shell command execution (T1059.004) by an authenticated remote user; network-accessible application component matches T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the user-defined function component.

Deeper analysisAI

CVE-2025-13687 is an OS command injection vulnerability (CWE-78) in IBM DataStage on Cloud Pak for Data versions 5.1.2 through 5.3.0. It arises from improper validation of user-supplied input in the user-defined function component, which could allow an authenticated user to execute arbitrary commands on the system with normal user privileges. The vulnerability has a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, and low impacts across confidentiality, integrity, and availability.

An authenticated user with low privileges (PR:L) can exploit this vulnerability remotely over the network without user interaction. By supplying malicious input through the user-defined function component, the attacker can execute arbitrary commands, potentially leading to limited data exposure, modification, or disruption on the affected system, all under the context of normal user privileges.

IBM has published an advisory with remediation details at https://www.ibm.com/support/pages/node/7262347, published on 2026-03-03. Security practitioners should consult this reference for patch availability and mitigation guidance specific to the affected Cloud Pak for Data releases.

Details

CWE(s)

Affected Products

ibm
datastage on cloud pak for data
5.1.2 — 5.3.1

CVEs Like This One

CVE-2025-13688Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13686Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13616Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13689Same product: Ibm Datastage On Cloud Pak For Data
CVE-2025-13691Same product: Ibm Datastage On Cloud Pak For Data
CVE-2026-1345Same vendor: Ibm
CVE-2024-55904Same vendor: Ibm
CVE-2024-51450Same vendor: Ibm
CVE-2024-56347Same vendor: Ibm
CVE-2024-56346Same vendor: Ibm

References