CVE-2025-13723
Published: 13 March 2026
Summary
CVE-2025-13723 is a medium-severity Use of a Key Past its Expiration Date (CWE-324) vulnerability in Ibm Sterling Partner Engagement Manager. Its CVSS base score is 5.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Key-management requirements enforce lifecycle controls that prevent continued use of expired or superseded keys.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing app allows unauthenticated remote use of expired access tokens (CWE-324) for data access, directly mapping to public app exploitation and alternate token auth material.
NVD Description
IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive user information using an expired access token
Deeper analysisAI
CVE-2025-13723 affects IBM Sterling Partner Engagement Manager in versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2. The vulnerability enables an attacker to obtain sensitive user information by using an expired access token. It is linked to CWE-324 and carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), reflecting medium severity with network accessibility, low attack complexity, no privileges or user interaction needed, and low-impact confidentiality exposure.
An unauthenticated remote attacker can exploit this issue over the network with minimal effort. By leveraging an expired access token, the attacker gains read access to sensitive user information, resulting in unauthorized data disclosure without impacting integrity or availability.
IBM's security advisory, available at https://www.ibm.com/support/pages/node/7263391, provides details on the issue and recommended mitigations.
Details
- CWE(s)