Skip to main content

CVE-2025-0917: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Cognos Analytics

Medium
VulnerabilityCVE-2025-0917cvecve-2025-0917cwe-79
Published: Wed Jun 11 2025 (06/11/2025, 17:27:49 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Cognos Analytics

Description

IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI-Powered Analysis

AILast updated: 08/25/2025, 00:36:59 UTC

Technical Analysis

CVE-2025-0917 is a stored cross-site scripting (XSS) vulnerability affecting multiple versions of IBM Cognos Analytics, specifically versions 11.2.0 through 11.2.4 and 12.0.0 through 12.0.4. The vulnerability is categorized under CWE-79, which involves improper neutralization of input during web page generation. In this case, a privileged user can inject arbitrary JavaScript code into the web user interface of Cognos Analytics. Because this code is stored and executed within the context of the application, it can alter the intended functionality of the web interface. The primary risk is that this injected script could lead to the disclosure of sensitive information such as user credentials within a trusted session. The vulnerability requires a privileged user to exploit, meaning the attacker must already have elevated access to the system. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the network attack vector, low attack complexity, high privileges required, no user interaction needed, and a scope change with limited confidentiality and integrity impact but no availability impact. No known public exploits have been reported to date. The vulnerability affects a widely used enterprise analytics platform, which is often deployed in environments handling sensitive business intelligence data, making it a significant concern for organizations relying on IBM Cognos Analytics for decision-making and reporting.

Potential Impact

For European organizations, the impact of this vulnerability can be significant due to the widespread use of IBM Cognos Analytics in various sectors including finance, manufacturing, government, and healthcare. Exploitation could lead to unauthorized disclosure of credentials or session tokens, potentially allowing attackers to escalate privileges or move laterally within the network. This could compromise the confidentiality and integrity of sensitive business data and analytics reports. Given the privileged user requirement, insider threats or compromised administrative accounts pose the greatest risk. The vulnerability could also undermine trust in the analytics platform and disrupt business operations if exploited. Additionally, organizations subject to strict data protection regulations such as GDPR may face compliance risks and potential penalties if sensitive data is exposed due to this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Apply patches or updates from IBM as soon as they become available, as no patch links are currently provided but are expected given the vulnerability's publication. 2) Restrict privileged user access strictly to necessary personnel and enforce strong authentication and session management controls to reduce the risk of credential compromise. 3) Implement web application firewalls (WAFs) with rules designed to detect and block malicious script injections targeting Cognos Analytics interfaces. 4) Conduct regular security audits and code reviews of any customizations or extensions to the Cognos environment to ensure no additional injection vectors exist. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts, especially from privileged accounts. 6) Educate administrators and privileged users about the risks of XSS and safe usage practices within the analytics platform. 7) Consider network segmentation to isolate Cognos Analytics servers and limit exposure to only trusted internal networks. These steps, combined with timely patching, will reduce the likelihood and impact of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-01-30T23:58:48.707Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6849bfa7527d26c5b90cca0f

Added to database: 6/11/2025, 5:40:55 PM

Last enriched: 8/25/2025, 12:36:59 AM

Last updated: 9/21/2025, 9:50:39 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats