Cyber Posture

CVE-2025-36072

HighRCE

Published: 20 November 2025

Published
20 November 2025
Modified
15 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0071 72.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-36072 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Ibm Webmethods Integration. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 27.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching and remediation of the deserialization flaw as specified in IBM's security advisory to prevent arbitrary code execution.

prevent

Mandates validation of untrusted inputs prior to deserialization to block malicious object graphs from being processed.

prevent

Provides memory protections such as DEP and ASLR to mitigate the impact of arbitrary code execution resulting from unsafe deserialization.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Deserialization vulnerability in network-accessible IBM webMethods Integration Server enables remote code execution by low-privileged authenticated users, directly facilitating T1190 (Exploit Public-Facing Application) and T1068 (Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

IBM webMethods Integration 10.11 through 10.11_Core_Fix22, 10.15 through 10.15_Core_Fix22, and 11.1 through 11.1_Core_Fix6 IBM webMethods Integration allow an authenticated user to execute arbitrary code on the system, caused by the deserialization of untrusted object graphs data.

Deeper analysisAI

CVE-2025-36072 affects IBM webMethods Integration in versions 10.11 through 10.11_Core_Fix22, 10.15 through 10.15_Core_Fix22, and 11.1 through 11.1_Core_Fix6. The vulnerability stems from the deserialization of untrusted object graphs data, enabling an authenticated user to execute arbitrary code on the system. It is classified under CWE-502 (Deserialization of Untrusted Data) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An attacker requires low-privileged authenticated access (PR:L) to exploit this remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in arbitrary code execution on the targeted system within the unchanged security scope (S:U).

IBM's security advisory provides details on mitigation and patches at https://www.ibm.com/support/pages/node/7252090.

Details

CWE(s)

Affected Products

ibm
webmethods integration
10.11, 10.15, 11.1

CVEs Like This One

CVE-2024-31903Same vendor: Ibm
CVE-2023-49886Same vendor: Ibm
CVE-2025-2000Same vendor: Ibm
CVE-2024-28777Same vendor: Ibm
CVE-2024-22341Same vendor: Ibm
CVE-2025-1403Same vendor: Ibm
CVE-2026-3621Same vendor: Ibm
CVE-2025-49869Shared CWE-502
CVE-2026-24954Shared CWE-502
CVE-2025-54007Shared CWE-502

References