SB2026040252 - Multiple vulnerabilities in IBM WebSphere Application Server Liberty



SB2026040252 - Multiple vulnerabilities in IBM WebSphere Application Server Liberty

Published: April 2, 2026

Security Bulletin ID SB2026040252
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2026-1561)

The disclosed vulnerability allows a remote user to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input when the samlWeb-2.0 feature enabled. A remote user can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


2) Weak password requirements (CVE-ID: CVE-2025-14917)

The vulnerability allows an attacker to perform a brute-force attack.

The vulnerability exists due to weak password requirements when the appSecurity-1.0, appSecurity-2.0, appSecurity-3.0, appSecurity-4.0 or appSecurity-5.0 feature is enabled. As a result users can set weak passwords to access their accounts. A remote attacker can perform brute-force attack and gain unauthorized access to the application. 


3) Information disclosure (CVE-ID: CVE-2025-14915)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application with the restConnector-1.0 or restConnector-2.0 feature enabled. A remote authenticated user can gain unauthorized access to sensitive information and escalate privileges within thin the application.


Remediation

Install update from vendor's website.