CVE-2025-33004
📋 TL;DR
This vulnerability in IBM Planning Analytics Local allows privileged users to delete files from directories they shouldn't have access to due to improper pathname restrictions. It affects IBM Planning Analytics Local versions 2.0 and 2.1. The issue stems from insufficient validation of file paths, enabling directory traversal attacks.
💻 Affected Systems
- IBM Planning Analytics Local
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
A malicious privileged user could delete critical system files, configuration files, or application data, potentially causing service disruption, data loss, or system compromise.
Likely Case
Privileged users could delete application-specific files, logs, or temporary data, disrupting Planning Analytics functionality or causing data integrity issues.
If Mitigated
With proper access controls and monitoring, impact is limited to authorized users misusing their privileges within the application's data directories.
🎯 Exploit Status
Exploitation requires existing privileged credentials. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply the fix as described in IBM Security Bulletin
Vendor Advisory: https://www.ibm.com/support/pages/node/7235182
Restart Required: Yes
Instructions:
1. Review IBM Security Bulletin. 2. Apply the recommended fix from IBM. 3. Restart Planning Analytics services. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Restrict Privileged Access
allLimit the number of users with privileged access to Planning Analytics to only those who absolutely need it.
Implement File System Monitoring
allMonitor for unauthorized file deletion attempts in Planning Analytics directories.
🧯 If You Can't Patch
- Implement strict least-privilege access controls for Planning Analytics users
- Enable detailed auditing of file operations within Planning Analytics directories
🔍 How to Verify
Check if Vulnerable:
Check if running IBM Planning Analytics Local version 2.0 or 2.1. Review user privilege assignments.
Check Version:
Check Planning Analytics version through administration console or configuration files
Verify Fix Applied:
Verify the fix has been applied by checking version or consulting IBM's verification guidance in the security bulletin.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file deletion events in Planning Analytics logs
- Multiple failed file access attempts followed by successful deletions
Network Indicators:
- Unusual patterns of administrative access to Planning Analytics
SIEM Query:
Search for 'file delete' or 'directory traversal' events in Planning Analytics application logs from privileged users