SB2025122225 - Multiple vulnerabilities in IBM Security QRadar Analyst Workflow for IBM QRadar SIEM
Published: December 22, 2025 Updated: February 13, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2025-55183)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the server may expose the source code of any server function when receiving a specially crafted HTTP request. A remote attacker can gain access to sensitive information.
The vulnerability affects the following components:
- react-server-dom-webpack (Meta)
- react-server-dom-turbopack (Meta)
- react-server-dom-parcel (Meta)
Successful exploitation requires the existence of a Server Function which explicitly or implicitly exposes a stringified argument.
2) Inefficient regular expression complexity (CVE-ID: CVE-2025-27789)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation when processing untrusted input with a regular expressions. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.
3) Input validation error (CVE-ID: CVE-2025-9288)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a missing type check when handling untrusted input that can lead to calculation of invalid values or rewinding the hash state. A remote attacker can pass specially crafted data to the application and bypass implemented security restrictions.
4) Deserialization of untrusted data (CVE-ID: CVE-2025-55182)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data passed to React Server Function endpoints. A remote non-authenticated attacker can send a specially crafted HTTP request to the React server components and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2025-57822)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input when next() is used without explicitly passing the request object. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
6) Deserialization of Untrusted Data (CVE-ID: CVE-2025-67779)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can send a specially crafted HTTP request, which can cause an infinite loop and prevent future HTTP requests from being served, leading to a denial of service condition.
The vulnerability affects the following components:
- react-server-dom-webpack (Meta)
- react-server-dom-turbopack (Meta)
- react-server-dom-parcel (Meta)
7) Deserialization of Untrusted Data (CVE-ID: CVE-2025-55184)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can send a specially crafted HTTP request, which can cause an infinite loop and prevent future HTTP requests from being served, leading to a denial of service condition.
The vulnerability affects the following components:
- react-server-dom-webpack (Meta)
- react-server-dom-turbopack (Meta)
- react-server-dom-parcel (Meta)
8) Improper authorization (CVE-ID: CVE-2025-29927)
The vulnerability allows a remote attacker to bypass authorization process.
The vulnerability exists due to missing authorization checks. A remote attacker can bypass authorization mechanism and compromise the affected application.
9) Memory leak (CVE-ID: CVE-2025-47279)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due memory leak when handling invalid certificates. A remote attacker can force the application to leak memory and perform denial of service attack.
10) Link following (CVE-ID: CVE-2025-54798)
The vulnerability allows a local user to modify data on the system.
The vulnerability exists due to an insecure link following issue. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
11) Inefficient regular expression complexity (CVE-ID: CVE-2025-5889)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation when processing untrusted input with a regular expressions. A remote user can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.
12) Use of insufficiently random values (CVE-ID: CVE-2025-7783)
The vulnerability allows a remote attacker to perform parameter injection attacks.
The vulnerability exists due to software uses a weak Math.random() method to generated random values for multipart form-encoded data. A remote attacker can observe values produced by Math.random in the target application and predict the random number used to generate form-data's boundary value and inject arbitrary parameters into requests.
13) Use of cache containing sensitive information (CVE-ID: CVE-2025-57752)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper cache management in Image Optimization API. A remote attacker can gain access to sensitive images cached by the application.
14) Input validation error (CVE-ID: CVE-2025-55173)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input within the Image Optimization feature. A remote attacker with control over external image sources can trigger file downloads with arbitrary content and filenames under specific configurations and perform phishing attacks.
15) OS Command Injection (CVE-ID: CVE-2025-64756)
The vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when processing file names. A remote user can pass specially crafted filename to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.