Attackers can attack systems with IBM’s application integration software, App Connect Enterprise. Malicious code can get onto PCs and compromise them. This has been patched before, but the security update was incomplete. The developers have now released a repaired patch. There are still no reports of attackers exploiting the vulnerability.
Critical security vulnerability
The vulnerability (CVE-2025-1302 “critical”) affects the jsonpath-plus module for processing JSON configurations. Because input is not sufficiently checked, attackers can use crafted requests here and end up executing malicious code.
The vulnerability made headlines back in December 2024 with the identifier CVE-2024-21534. As the developers have since written in a warning message, the patch was broken and did not adequately protect systems.
The developers assure that the vulnerability has now been fixed in the 12.0.12.12 APAR IT47820 and 13.0.3.0 APAR IT47820 releases. Another vulnerability (CVE-2025-24791 “medium”), which allows attackers to bypass access restrictions, has also been closed.
(des)
Don’t miss any news – follow us on
Facebook,
LinkedIn or
Mastodon.
This article was originally published in
German.
It was translated with technical assistance and editorially reviewed before publication.