Cyber Posture

CVE-2025-36418

High

Published: 20 January 2026

Published
20 January 2026
Modified
26 January 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0003 7.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-36418 is a high-severity Improper Verification of Cryptographic Signature (CWE-347) vulnerability in Ibm Applinx. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-347

Requires verification of digital signatures using organization-approved certificates before installation, directly preventing improper verification of cryptographic signatures.

addresses: CWE-347

Component authenticity commonly depends on cryptographic signatures; the control enforces proper verification of those signatures.

addresses: CWE-347

PKI certificates under an approved policy require cryptographic signature verification on issuance and validation.

addresses: CWE-347

Requires cryptographic signatures on authoritative data and support for verifying the chain of trust.

addresses: CWE-347

Mandates verification of cryptographic signatures (e.g., DNSSEC RRSIG) on resolution responses, addressing missing or bypassed signature checks.

addresses: CWE-347

Integrity tools commonly rely on cryptographic signatures whose improper validation this weakness covers.

addresses: CWE-347

Authenticity validation commonly relies on cryptographic signature or certificate checks that this control enforces.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1606 Forge Web Credentials Credential Access
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.
Why these techniques?

Direct JWT forgery enables privilege escalation via impersonation (T1068) and forging of web credentials (T1606).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM ApplinX 11.1 is vulnerable due to a privilege escalation vulnerability due to improper verification of JWT tokens. An attacker may be able to craft or modify a JSON web token in order to impersonate another user or to elevate…

more

their privileges.

Deeper analysisAI

CVE-2025-36418 is a privilege escalation vulnerability in IBM ApplinX 11.1 caused by improper verification of JSON Web Tokens (JWTs). This flaw, linked to CWE-347 (Invalid or Incorrect Use of Primary Channel), enables attackers to craft or modify JWTs for unauthorized access. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and low exploitation barriers.

An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows the attacker to impersonate another user or elevate their privileges, potentially leading to low-level impacts on confidentiality, integrity, and availability.

IBM has issued a security advisory detailing the issue at https://www.ibm.com/support/pages/node/7257446, which provides guidance on mitigation and patching.

Details

CWE(s)

Affected Products

ibm
applinx
11.1.0

CVEs Like This One

CVE-2026-2311Same vendor: Ibm
CVE-2024-49814Same vendor: Ibm
CVE-2025-36184Same vendor: Ibm
CVE-2025-14604Same vendor: Ibm
CVE-2026-6389Same vendor: Ibm
CVE-2025-0161Same vendor: Ibm
CVE-2025-36072Same vendor: Ibm
CVE-2024-55898Same vendor: Ibm
CVE-2026-1346Same vendor: Ibm
CVE-2026-29000Shared CWE-347

References