IBM Engineering Requirements Management DOORS Next 7.1, and 7.2 could allow an authenticated user to view and edit data beyond their authorized access permissions.

Project Subscriptions

Vendors Products
Engineering Requirements Management Doors Next Subscribe
Advisories

No advisories yet.

Fixes

Solution

IBM strongly recommends addressing the vulnerabilities now by taking the actions documented in this bulletin. For IBM Engineering Requirements Management DOORS Next 7.1, install ifix 08 or newer. For IBM Engineering Requirements Management DOORS Next 7.2, install ifix 01 or newer.


Workaround

No workaround given by the vendor.

History

Tue, 03 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description IBM Engineering Requirements Management DOORS Next 7.1, and 7.2 could allow an authenticated user to view and edit data beyond their authorized access permissions.
Title IBM Engineering Requirements Management DOORS Next could allow an authenticated user to access and modify data beyond authorized permissions
First Time appeared Ibm
Ibm engineering Requirements Management Doors Next
Weaknesses CWE-862
CPEs cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.2:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm engineering Requirements Management Doors Next
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-03-03T19:51:48.142Z

Reserved: 2025-11-26T02:11:54.076Z

Link: CVE-2025-13734

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-03T20:16:42.427

Modified: 2026-03-03T21:52:29.877

Link: CVE-2025-13734

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses