CVE-2025-27368

4.3 MEDIUM

📋 TL;DR

IBM OpenPages 9.0 and 9.1 has insecure REST endpoints that allow authenticated users to access system metadata beyond their intended permissions. This information disclosure vulnerability affects all users with authenticated access to vulnerable OpenPages instances.

💻 Affected Systems

Products:
  • IBM OpenPages
Versions: 9.0 and 9.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of the specified versions; authentication is required but standard user accounts can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could map the entire system architecture, discover sensitive configuration details, and potentially identify other vulnerabilities or attack paths.

🟠

Likely Case

Users accidentally or intentionally accessing metadata about system components, workflows, or configurations they shouldn't see, potentially enabling further reconnaissance.

🟢

If Mitigated

Limited exposure of non-critical system metadata with minimal operational impact.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed instances could be targeted by attackers with stolen credentials.
🏢 Internal Only: MEDIUM - Insider threats or compromised accounts could exploit this to gather intelligence about the OpenPages deployment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but involves simple API calls to vulnerable REST endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7250238

Restart Required: Yes

Instructions:

1. Review IBM advisory 7250238. 2. Apply the recommended interim fix or upgrade to a fixed version. 3. Restart OpenPages services. 4. Verify the fix by testing the previously vulnerable endpoints.

🔧 Temporary Workarounds

Network segmentation and access controls

all

Restrict network access to OpenPages REST API endpoints to only trusted users and systems

Enhanced monitoring of API access

all

Implement logging and alerting for unusual patterns of REST API calls to metadata endpoints

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all user accounts
  • Deploy web application firewall rules to block suspicious patterns of REST API calls

🔍 How to Verify

Check if Vulnerable:

Test authenticated access to OpenPages REST endpoints that return system metadata; if you can access metadata beyond your role permissions, the system is vulnerable.

Check Version:

Check OpenPages version through administrative interface or consult deployment documentation

Verify Fix Applied:

After applying patches, retest the same REST endpoints to confirm they now properly enforce access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of GET requests to REST endpoints, particularly those accessing system metadata
  • Multiple failed authorization attempts followed by successful metadata access

Network Indicators:

  • High volume of REST API calls to metadata endpoints from single user sessions
  • Patterns of sequential enumeration of REST endpoints

SIEM Query:

source="openpages" AND (uri_path CONTAINS "/api/" OR uri_path CONTAINS "/rest/") AND (http_method="GET") AND (response_code=200) | stats count by user, uri_path

🔗 References

📤 Share & Export