Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-36335— Vulnerabilities found

CVSS 6.2 · Medium EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-36335

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vulnerabilities found
Source: NVD (National Vulnerability Database)
Vulnerability Description
IBM watsonx.data intelligence 5.2.0, 5.2.1, 5.3.0, 5.3.1 stores user credentials in plain text which can be read by a local user.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
明文存储口令
Source: NVD (National Vulnerability Database)
Vulnerability Title
IBM watsonx.data intelligence 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IBM watsonx.data intelligence是美国国际商业机器(IBM)公司的一个数据智能平台。 IBM watsonx.data intelligence 5.2.0版本、5.2.1版本、5.3.0版本和5.3.1版本存在安全漏洞,该漏洞源于以明文存储用户凭据,可能被本地用户读取。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
IBMwatsonx.data intelligence 5.2.0, 5.2.1, 5.3.0, 5.3.1 ~ 1.8.4 cpe:2.3:a:ibm:watsonxdata_intelligence:5.2.0:*:*:*:*:*:*:*

II. Public POCs for CVE-2025-36335

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-36335

登录查看更多情报信息。

Same Patch Batch · IBM · 2026-04-30 · 14 CVEs total

CVE-2026-63898.8 HIGHIBM Turbonomic Prometurbo agent used by IBM Turbonomic Application Resource Management is
CVE-2026-65438.8 HIGHAuthenticated Remote Code Execution Vulnerability in Langflow Code Validation Endpoint
CVE-2026-45037.5 HIGHUnauthenticated Insecure Direct Object Reference (IDOR) Vulnerability in Langflow Desktop
CVE-2026-15776.5 MEDIUMIBM® Db2® is vulnerable to a denial of service with a specially crafted query involving mu
CVE-2025-361226.5 MEDIUMIBM® Db2® is vulnerable to a denial of service with a specially crafted query when stmthea
CVE-2026-65426.5 MEDIUMMonitor API allows cross-user read of transaction logs and deletion of build data via flow
CVE-2026-33456.5 MEDIUMPath Traversal and Arbitrary File Write Vulnerability in IBM Langflow Desktop API v2 File
CVE-2026-33406.5 MEDIUMServer-Side Request Forgery (SSRF) in Langflow URL Component
CVE-2026-45026.5 MEDIUMArbitrary File Write and Remote Code Execution Vulnerability in Langflow v2 API
CVE-2026-23116.4 MEDIUMIBM i is affected by a privilege escalation vulnerability in Web Administration GUI []
CVE-2026-33466.4 MEDIUMStored Cross-Site Scripting (XSS) in Langflow Markdown Rendering via rehypeRaw
CVE-2025-146885.3 MEDIUMIBM® Db2® is vulnerable to a denial of service when fetching from certain tables under spe
CVE-2025-361805.3 MEDIUMInadequate Pod Communication Restrictions, affects watsonx.data

IV. Related Vulnerabilities

V. Comments for CVE-2025-36335

No comments yet


Leave a comment