No advisories yet.
Solution
IBM strongly recommends addressing the vulnerability now by applying a currently available interim fix or fix pack that contains the fix for APAR PH70352. IBM WebSphere Application Server Liberty is affected by identity spoofing only when the appSecurity feature (appSecurity-1.0, appSecurity-2.0, appSecurity-3.0, appSecurity-4.0, or appSecurity-5.0) is not enabled on the server. To determine if a feature is enabled for IBM WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature https://www.ibm.com/support/pages/node/6553910 . For IBM WebSphere Application Server Liberty 17.0.0.3 - 26.0.0.4: · Upgrade to minimal fix pack levels as required by the interim fix and then apply the Interim Fix that resolves PH70352 https://www.ibm.com/support/pages/node/7270436 --OR-- · Apply Liberty Fix Pack 26.0.0.5 or later (targeted availability 2Q2026). Additional interim fixes may be available and linked off the interim fix download page.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7270437 |
|
Wed, 22 Apr 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.4 IBM WebSphere Application Server Liberty is vulnerable to identity spoofing under limited conditions when an application is deployed without authentication and authorization configured. | |
| Title | IBM WebSphere Application Server Liberty is affected by identity spoofing | |
| First Time appeared |
Ibm
Ibm websphere Application Server Liberty |
|
| Weaknesses | CWE-269 | |
| CPEs | cpe:2.3:a:ibm:websphere_application_server___liberty:17.0.0.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:websphere_application_server___liberty:26.0.0.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm websphere Application Server Liberty |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-04-22T23:07:31.595Z
Reserved: 2026-03-05T21:53:23.170Z
Link: CVE-2026-3621
No data.
Status : Received
Published: 2026-04-23T00:16:45.313
Modified: 2026-04-23T00:16:45.313
Link: CVE-2026-3621
No data.
OpenCVE Enrichment
No data.