Anonymous Intelligence Signal

IBM Watsonx Code Assistant Fixes Critical Admin Bypass Vulnerability Exposing Private User Resources

human The Lab unverified 2026-04-20 13:22:55 Source: GitHub Issues

A critical security vulnerability in IBM's Watsonx Code Assistant allowed administrators to bypass access controls and view private resources belonging to other users. The flaw, tracked internally as Jira issue ICACF-21, violated the platform's core security principle that private resources—including tools, prompts, and servers—should be accessible only to their owners. This exposure occurred through specific API endpoints where admin privileges were incorrectly interpreted as granting universal access.

The fix modifies the service layer to explicitly deny the admin bypass for private resources. Administrators now retain access only to public and team-shared resources, not private ones. The patch also corrects multiple API endpoints to properly pass user context for authorization checks and introduces comprehensive test coverage to validate the security changes. Crucially, unauthorized access attempts now return generic "not found" errors to prevent information disclosure about the existence of protected resources.

This incident highlights a significant internal security failure where elevated system roles inadvertently created a data isolation breach. The fix directly impacts administrative workflows and underscores the persistent risk of privilege escalation in complex enterprise platforms. While the vulnerability is now patched, its existence raises questions about the initial access control design and the potential period of exposure before detection and remediation.