CVE-2025-36072
Published: 20 November 2025
Description
IBM webMethods Integration 10.11 through 10.11_Core_Fix22, 10.15 through 10.15_Core_Fix22, and 11.1 through 11.1_Core_Fix6 IBM webMethods Integration allow an authenticated user to execute arbitrary code on the system, caused by the deserialization of untrusted object graphs data.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely patching and remediation of the deserialization flaw as specified in IBM's security advisory to prevent arbitrary code execution.
Mandates validation of untrusted inputs prior to deserialization to block malicious object graphs from being processed.
Provides memory protections such as DEP and ASLR to mitigate the impact of arbitrary code execution resulting from unsafe deserialization.
Security SummaryAI
CVE-2025-36072 affects IBM webMethods Integration in versions 10.11 through 10.11_Core_Fix22, 10.15 through 10.15_Core_Fix22, and 11.1 through 11.1_Core_Fix6. The vulnerability stems from the deserialization of untrusted object graphs data, enabling an authenticated user to execute arbitrary code on the system. It is classified under CWE-502 (Deserialization of Untrusted Data) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
An attacker requires low-privileged authenticated access (PR:L) to exploit this remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in arbitrary code execution on the targeted system within the unchanged security scope (S:U).
IBM's security advisory provides details on mitigation and patches at https://www.ibm.com/support/pages/node/7252090.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Deserialization vulnerability in network-accessible IBM webMethods Integration Server enables remote code execution by low-privileged authenticated users, directly facilitating T1190 (Exploit Public-Facing Application) and T1068 (Exploitation for Privilege Escalation).