CVE-2025-36026

IBM Datacap information disclosure

Description

IBM Datacap 9.1.7, 9.1.8, and 9.1.9 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.

Remediation

Solution:

  • IBM strongly suggests that you address the vulnerabilities now for all the affected products/versions listed above by installing Fix. See the https://www.ibm.com/support/pages/node/7231588  readme for details.

Category

4.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.02%
Vendor Advisory ibm.com
Affected: IBM Datacap
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-36026?
CVE-2025-36026 has been scored as a medium severity vulnerability.
How to fix CVE-2025-36026?
To fix CVE-2025-36026: IBM strongly suggests that you address the vulnerabilities now for all the affected products/versions listed above by installing Fix. See the https://www.ibm.com/support/pages/node/7231588  readme for details.
Is CVE-2025-36026 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-36026 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-36026?
CVE-2025-36026 affects IBM Datacap.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.