Skip to main content

CVE-2025-2793: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Sterling B2B Integrator

Medium
VulnerabilityCVE-2025-2793cvecve-2025-2793cwe-79
Published: Tue Jul 08 2025 (07/08/2025, 14:59:15 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling B2B Integrator

Description

IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.6, 6.2.0.0 through 6.2.0.4, IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6, and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI-Powered Analysis

AILast updated: 08/25/2025, 00:44:30 UTC

Technical Analysis

CVE-2025-2793 is a medium-severity cross-site scripting (XSS) vulnerability identified in IBM Sterling B2B Integrator and IBM Sterling File Gateway products, specifically affecting versions 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing an authenticated user to inject arbitrary JavaScript code into the web user interface. This injected script can alter the intended functionality of the application, potentially leading to the disclosure of credentials within a trusted session. The vulnerability requires the attacker to have authenticated access and involves user interaction, as the malicious script executes in the context of a legitimate user’s session. The CVSS v3.1 base score is 5.4, reflecting a medium severity with network attack vector, low attack complexity, and privileges required. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. While no known exploits are currently reported in the wild, the vulnerability poses a risk in environments where IBM Sterling B2B Integrator or File Gateway are deployed, particularly in business-to-business data exchange scenarios where sensitive information and credentials are handled.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for enterprises relying on IBM Sterling B2B Integrator and File Gateway for secure data exchange and supply chain communications. Exploitation could lead to unauthorized disclosure of credentials, enabling attackers to escalate privileges or move laterally within the network. This could compromise the confidentiality and integrity of sensitive business data and disrupt critical business processes. Given the trusted nature of the sessions and the business-critical role of these products, exploitation could also damage organizational reputation and lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. The medium severity score reflects that while the vulnerability requires authentication and user interaction, the potential for credential theft and session manipulation within a trusted environment elevates the risk profile for affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Apply any available patches or updates from IBM as soon as they are released, as no patch links are currently provided but monitoring IBM advisories is critical. 2) Restrict access to the IBM Sterling B2B Integrator and File Gateway web interfaces to trusted personnel only, implementing strong authentication mechanisms and network segmentation to limit exposure. 3) Implement strict input validation and output encoding on all user-supplied data within the application, if customization or additional controls are possible. 4) Monitor web application logs and user activity for unusual behavior indicative of XSS exploitation attempts. 5) Educate authenticated users about the risks of interacting with unexpected or suspicious content within the application interface. 6) Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting the execution of unauthorized scripts. 7) Conduct regular security assessments and penetration testing focused on web interface vulnerabilities to detect similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-03-25T15:10:58.467Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d34a96f40f0eb72f7c594

Added to database: 7/8/2025, 3:09:29 PM

Last enriched: 8/25/2025, 12:44:30 AM

Last updated: 9/18/2025, 1:25:46 PM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats