{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T21:03:49.254","vulnerabilities":[{"cve":{"id":"CVE-2025-36059","sourceIdentifier":"psirt@us.ibm.com","published":"2026-01-20T16:16:02.920","lastModified":"2026-02-17T17:24:57.763","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 24.0.1 Interim Fix 005, and 24.0.0 through 24.0.0 Interim Fix 006. IBM Cloud Pak for Business Automation could allow a local user with access to the container to execute OS system calls."},{"lang":"es","value":"Contenedores de IBM Business Automation Workflow 25.0.0 hasta 25.0.0 Interim Fix 002, 24.0.1 hasta 24.0.1 Interim Fix 005, y 24.0.0 hasta 24.0.0 Interim Fix 006. IBM Cloud Pak para Business Automation podría permitir a un usuario local con acceso al contenedor ejecutar llamadas al sistema operativo."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Primary","description":[{"lang":"en","value":"CWE-250"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:-:*:*:containers:*:*:*","matchCriteriaId":"EF29B7C7-5024-4A85-ADE5-D94E9002181D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if001:*:*:containers:*:*:*","matchCriteriaId":"8464D4F4-1F9A-479B-B689-C6E90BC3AF45"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if002:*:*:containers:*:*:*","matchCriteriaId":"0FE0DB1D-5728-4075-BE84-48F06E22FDF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if003:*:*:containers:*:*:*","matchCriteriaId":"A4AB37B4-DF91-4DC7-AFB9-107E5B1B2BF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if004:*:*:containers:*:*:*","matchCriteriaId":"79318EB6-001D-4D75-952C-87297C90A0C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if005:*:*:containers:*:*:*","matchCriteriaId":"38F4B5AC-AC9D-48E7-9EC8-48C086CC62A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if006:*:*:containers:*:*:*","matchCriteriaId":"73BAD8DC-3081-4D07-8E65-7501351DE025"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.1:-:*:*:containers:*:*:*","matchCriteriaId":"D5D9EC44-05CE-44FA-AFDE-A4FA326A54F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if001:*:*:containers:*:*:*","matchCriteriaId":"AD2EC4AD-EF47-450F-AA73-8BEE3DADEA1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if002:*:*:containers:*:*:*","matchCriteriaId":"0CFCCD13-9342-4D3D-BE9C-ABCA4EA27229"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if004:*:*:containers:*:*:*","matchCriteriaId":"5797C332-AE9A-40BF-BAA4-7ECDDEAA907C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if005:*:*:containers:*:*:*","matchCriteriaId":"D0F5EB0D-CAF6-45BC-967B-472F1C2833D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:25.0.0:-:*:*:containers:*:*:*","matchCriteriaId":"3058E645-44E1-4FF0-9A97-E04324BB8968"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:25.0.0:if001:*:*:containers:*:*:*","matchCriteriaId":"0E06ACEC-AC03-41AA-91C7-BA84457847A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:25.0.0:if002:*:*:containers:*:*:*","matchCriteriaId":"6AD427CB-B553-4ACB-B2A3-1648848D6D09"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7256777","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}