SB2025091525 - Multiple vulnerabilities in IBM Business Automation Workflow 



SB2025091525 - Multiple vulnerabilities in IBM Business Automation Workflow

Published: September 15, 2025

Security Bulletin ID SB2025091525
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Memory leak (CVE-ID: CVE-2025-23165)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak in ReadFileUtf8 caused by a corrupted pointer. A remote attacker can force the application to leak memory and perform denial of service attack.


2) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2025-23167)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/1 headers in llhttp. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


3) Improper error handling (CVE-ID: CVE-2025-23166)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect error handling in async cryptographic operations within the SignTraits::DeriveBits() function. A remote attacker can send specially crafted input to the application can crash the Node.js runtime.


4) Improper Handling of Unexpected Data Type (CVE-ID: CVE-2025-7339)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can inadvertently modify response headers when an array is passed to `response.writeHead()`


5) Path traversal (CVE-ID: CVE-2025-27210)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to input validation error when processing directory traversal sequences affecting Windows device names like CON, PRN, and AUX. A local user can escalate privileges on the system.

Note, this vulnerability exists due to incomplete fix for #VU103223 (CVE-2025-23084).


6) Resource management error (CVE-ID: CVE-2025-27209)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists in V8 due to usage of rapidhash when computing hash strings. A remote attacker can generate multiple hash collisions, leading to a denial of service conditions. 


Remediation

Install update from vendor's website.