Cyber Posture

CVE-2025-36072

High

Published: 20 November 2025

Published
20 November 2025
Modified
15 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0071 72.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

IBM webMethods Integration 10.11 through 10.11_Core_Fix22, 10.15 through 10.15_Core_Fix22, and 11.1 through 11.1_Core_Fix6 IBM webMethods Integration allow an authenticated user to execute arbitrary code on the system, caused by the deserialization of untrusted object graphs data.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching and remediation of the deserialization flaw as specified in IBM's security advisory to prevent arbitrary code execution.

prevent

Mandates validation of untrusted inputs prior to deserialization to block malicious object graphs from being processed.

prevent

Provides memory protections such as DEP and ASLR to mitigate the impact of arbitrary code execution resulting from unsafe deserialization.

Security SummaryAI

CVE-2025-36072 affects IBM webMethods Integration in versions 10.11 through 10.11_Core_Fix22, 10.15 through 10.15_Core_Fix22, and 11.1 through 11.1_Core_Fix6. The vulnerability stems from the deserialization of untrusted object graphs data, enabling an authenticated user to execute arbitrary code on the system. It is classified under CWE-502 (Deserialization of Untrusted Data) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An attacker requires low-privileged authenticated access (PR:L) to exploit this remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows high-impact compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in arbitrary code execution on the targeted system within the unchanged security scope (S:U).

IBM's security advisory provides details on mitigation and patches at https://www.ibm.com/support/pages/node/7252090.

Details

CWE(s)

Affected Products

ibm
webmethods integration
10.11, 10.15, 11.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Deserialization vulnerability in network-accessible IBM webMethods Integration Server enables remote code execution by low-privileged authenticated users, directly facilitating T1190 (Exploit Public-Facing Application) and T1068 (Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References