Cyber Posture

CVE-2025-13726

Medium

Published: 13 March 2026

Published
13 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0005 16.1th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13726 is a medium-severity Generation of Error Message Containing Sensitive Information (CWE-209) vulnerability in Ibm Sterling Partner Engagement Manager. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Software (T1592.002); ranked at the 16.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Software (T1592.002).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-209

Detects error messages that leak sensitive information as evidence of disclosure.

addresses: CWE-209

The control directly mitigates generation of error messages containing sensitive authentication details by requiring obscured feedback instead of verbose responses.

addresses: CWE-209

Misdirection allows generation of misleading error messages that withhold or falsify sensitive details.

addresses: CWE-209

Explicitly requires error messages to avoid including sensitive or exploitable details while still supporting corrective action.

addresses: CWE-209

Validation ensures error messages contain only expected, non-sensitive content and blocks leakage via verbose errors.

addresses: CWE-209

Fail-safe procedures can be defined to suppress or sanitize error output, reducing generation of messages that contain sensitive information.

MITRE ATT&CK Enterprise TechniquesAI

T1592.002 Software Reconnaissance
Adversaries may gather information about the victim's host software that can be used during targeting.
Why these techniques?

Verbose error messages directly disclose software details and configuration, enabling passive victim host software discovery.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information when detailed technical error messages are returned. This information could be used in further attacks against the system.

Deeper analysisAI

CVE-2025-13726 is an information disclosure vulnerability (CWE-209) affecting IBM Sterling Partner Engagement Manager in versions 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2. The flaw occurs when the application returns detailed technical error messages to users, which may expose sensitive information about the system.

A remote attacker requires no privileges or user interaction to exploit this vulnerability over the network with low attack complexity. Exploitation enables the attacker to obtain sensitive information from the error messages, which could be leveraged to conduct further attacks against the system. The CVSS v3.1 base score is 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), reflecting medium severity with low confidentiality impact and no impact on integrity or availability.

IBM has published a security advisory with details on the vulnerability at https://www.ibm.com/support/pages/node/7263391.

Details

CWE(s)

Affected Products

ibm
sterling partner engagement manager
6.2.3 — 6.2.3.6 · 6.2.3 — 6.2.3.6 · 6.2.4 — 6.2.4.3

CVEs Like This One

CVE-2025-13723Same product: Ibm Sterling Partner Engagement Manager
CVE-2025-13718Same product: Ibm Sterling Partner Engagement Manager
CVE-2024-41742Same product: Linux Linux Kernel
CVE-2024-45643Same product: Linux Linux Kernel
CVE-2025-33088Same product: Linux Linux Kernel
CVE-2025-36253Same product: Linux Linux Kernel
CVE-2025-13214Same product: Linux Linux Kernel
CVE-2024-43178Same product: Linux Linux Kernel
CVE-2024-41746Same product: Linux Linux Kernel
CVE-2024-51476Same product: Linux Linux Kernel

References