Skip to main content

CVE-2025-0917: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Cognos Analytics

Medium
VulnerabilityCVE-2025-0917cvecve-2025-0917cwe-79
Published: Wed Jun 11 2025 (06/11/2025, 17:27:49 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics

Description

IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI-Powered Analysis

AILast updated: 07/12/2025, 09:16:31 UTC

Technical Analysis

CVE-2025-0917 is a stored cross-site scripting (XSS) vulnerability identified in multiple versions of IBM Cognos Analytics, specifically versions 11.2.0 through 11.2.4 and 12.0.0 through 12.0.4. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing a privileged user to inject arbitrary JavaScript code into the web user interface. This injected script executes within the context of the trusted session, potentially altering the intended functionality of the application. Since the vulnerability requires high privileges (PR:H) but no user interaction (UI:N), an attacker with administrative or equivalent access can exploit this flaw to embed malicious scripts that may lead to credential disclosure or other unauthorized actions within the session. The CVSS v3.1 base score is 5.5 (medium severity), reflecting network attack vector (AV:N), low attack complexity (AC:L), and a scope change (S:C) indicating that the vulnerability can affect components beyond the initially vulnerable component. The impact primarily affects confidentiality and integrity, with no direct impact on availability. No known exploits are reported in the wild as of the published date (June 11, 2025). The vulnerability affects a widely used enterprise analytics platform, which is often deployed in environments handling sensitive business intelligence data.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on IBM Cognos Analytics for critical business intelligence and decision-making processes. Exploitation could lead to unauthorized disclosure of sensitive credentials or session tokens, enabling attackers to escalate privileges or move laterally within the network. This can compromise the confidentiality and integrity of business data and analytics results, potentially leading to data breaches or manipulation of reports that inform strategic decisions. Given that the vulnerability requires privileged access, insider threats or compromised administrative accounts are primary risk vectors. The absence of user interaction lowers the barrier for exploitation once privileged access is obtained. Organizations in regulated sectors such as finance, healthcare, and government may face compliance risks and reputational damage if such vulnerabilities are exploited. Additionally, the scope change in the vulnerability suggests that the impact could extend beyond the immediate application, affecting integrated systems or services.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Apply patches or updates from IBM as soon as they become available, as no patch links are currently provided, monitoring IBM security advisories closely. 2) Restrict and monitor privileged user access to IBM Cognos Analytics, implementing strict access controls and multi-factor authentication to reduce the risk of credential compromise. 3) Conduct regular code and input validation reviews within custom reports or dashboards to detect and prevent injection of malicious scripts. 4) Employ web application firewalls (WAFs) with rules tailored to detect and block suspicious script injections targeting Cognos Analytics interfaces. 5) Implement session management best practices, including short session lifetimes and anomaly detection, to limit the window of opportunity for attackers leveraging stolen credentials. 6) Educate administrators and privileged users about the risks of XSS and safe usage practices. 7) Monitor logs and audit trails for unusual activities indicative of exploitation attempts. These measures, combined with timely patching, will reduce the likelihood and impact of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-01-30T23:58:48.707Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6849bfa7527d26c5b90cca0f

Added to database: 6/11/2025, 5:40:55 PM

Last enriched: 7/12/2025, 9:16:31 AM

Last updated: 7/30/2025, 4:17:09 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats