CVE-2025-13855
Description
IBM Storage Protect Server 8.2.0 IBM Storage Protect Plus Server is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
IBM Storage Protect Server 8.2.0 is vulnerable to SQL injection via its JSON-RPC endpoint, allowing authenticated attackers to execute arbitrary SQL queries on the backend database.
The vulnerability resides in the JSON-RPC endpoint of IBM Storage Protect Server 8.2.0. Improper neutralization of user-supplied input enables SQL injection attacks, allowing an authenticated remote attacker to craft malicious SQL statements that are executed against the backend database [1].
An attacker must be authenticated to the server and have network access to the JSON-RPC endpoint. No additional privileges are required, and the attack does not require user interaction. The attacker can send specially crafted SQL queries through the endpoint to manipulate database operations [1].
Successful exploitation allows the attacker to view, add, modify, or delete information in the back-end database. This includes potential access to administrative metadata stored in internal database tables, which could lead to further compromise of the system [1].
IBM has published a security bulletin for this issue. The affected version is IBM Storage Protect Server 8.2.0. IBM recommends applying the available fix as no workarounds are documented [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2cpe:2.3:a:ibm:storage_protect_server:8.2.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:ibm:storage_protect_server:8.2.0:*:*:*:*:*:*:*
- (no CPE)range: =8.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.ibm.com/support/pages/node/7267783nvdVendor Advisory
News mentions
0No linked articles in our index yet.