CVE-2025-13915
Authentication bypass in IBM API Connect
Description
IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.
INFO
Published Date :
Dec. 26, 2025, 2:15 p.m.
Last Modified :
Dec. 31, 2025, 9:37 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 9a959283-ebb5-44b6-b705-dcc2bbced522 | ||||
| CVSS 3.1 | CRITICAL | [email protected] | ||||
| CVSS 3.1 | CRITICAL | MITRE-CVE |
Solution
- Upgrade IBM API Connect to a fixed version.
- Apply vendor-supplied security patches.
- Verify authentication controls are effective.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-13915.
| URL | Resource |
|---|---|
| https://www.ibm.com/support/pages/node/7255149 | Vendor Advisory |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-13915 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-13915
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-13915 vulnerability anywhere in the article.
-
The Cyber Express
Critical IBM API Connect Vulnerability Enables Authentication Bypass
IBM has released security updates to address a critical IBM API Connect vulnerability that could allow remote attackers to bypass authentication controls and gain unauthorized access to affected appli ... Read more
-
CybersecurityNews
Critical IBM API Connect Vulnerability Let Attackers Bypass Logins
A critical security alert regarding a severe vulnerability in the IBM API Connect platform that could allow remote attackers to bypass authentication mechanisms. Discovered during internal testing, th ... Read more
-
The Hacker News
IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass
Dec 31, 2025Ravie LakshmananAPI Security / Vulnerability IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application. The ... Read more
-
BleepingComputer
IBM warns of critical API Connect auth bypass vulnerability
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could allow attackers to access apps remotely. API Connect is an application pro ... Read more
-
Daily CyberSecurity
CVE-2025-52691 (CVSS 10): Critical SmarterMail Flaw Opens Servers to Unauthenticated Attacks
The Cyber Security Agency of Singapore (CSA) has issued an urgent alert regarding a catastrophic vulnerability in SmarterMail, a popular enterprise alternative to Microsoft Exchange. The security flaw ... Read more
-
Daily CyberSecurity
CVE-2025-13915: Critical 9.8 Flaw in IBM API Connect Lets Attackers Bypass Login
IBM has issued an urgent security alert for users of its API Connect platform after internal testing uncovered a massive security hole that could leave enterprise applications wide open to intruders. ... Read more
-
Daily CyberSecurity
The Arms Dealer Returns: Why NVIDIA is Retreating from the Cloud War
Sources cited by The Information indicate that NVIDIA is undergoing an internal organizational restructuring, with plans to scale back its public cloud division, DGX Cloud. Rather than being fully dis ... Read more
The following table lists the changes that have been made to the
CVE-2025-13915 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Dec. 31, 2025
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:* versions from (including) 10.0.8.0 up to (including) 10.0.8.5 *cpe:2.3:a:ibm:api_connect:10.0.11.0:*:*:*:*:*:*:* Added Reference Type IBM Corporation: https://www.ibm.com/support/pages/node/7255149 Types: Vendor Advisory -
New CVE Received by [email protected]
Dec. 26, 2025
Action Type Old Value New Value Added Description IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-305 Added Reference https://www.ibm.com/support/pages/node/7255149