Skip to main content

CVE-2025-33097: CWE-79 in IBM QRadar SIEM

Medium
VulnerabilityCVE-2025-33097cvecve-2025-33097cwe-79
Published: Tue Jul 15 2025 (07/15/2025, 14:29:54 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: QRadar SIEM

Description

IBM QRadar SIEM 7.5 - 7.5.0 UP12 IF02 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI-Powered Analysis

AILast updated: 07/15/2025, 15:01:36 UTC

Technical Analysis

CVE-2025-33097 is a stored cross-site scripting (XSS) vulnerability identified in IBM QRadar SIEM versions 7.5 through 7.5.0 UP12 IF02. This vulnerability arises from insufficient input sanitization in the web user interface, allowing authenticated users to inject arbitrary JavaScript code that is persistently stored and executed within the context of the application. Because the vulnerability is stored XSS, the malicious script can be triggered whenever a legitimate user accesses the affected UI component, potentially altering the intended functionality of the SIEM platform. The exploitation does not require user interaction beyond accessing the compromised interface, and it can lead to sensitive information disclosure, including credentials, within a trusted session. The CVSS v3.1 base score is 6.4 (medium severity), reflecting that the attack vector is network-based, requires low complexity, and privileges of an authenticated user, but does not require user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially vulnerable module. The impact primarily affects confidentiality and integrity, with no direct impact on availability. No known exploits are currently reported in the wild, and no official patches or mitigation links have been published yet. The vulnerability is classified under CWE-79, which is a common and well-understood web application security weakness related to improper neutralization of input leading to XSS.

Potential Impact

For European organizations using IBM QRadar SIEM 7.5.x, this vulnerability poses a significant risk to the confidentiality and integrity of security monitoring data. QRadar SIEM is a critical security infrastructure component that aggregates and analyzes security events; compromise of its web interface could allow attackers to manipulate displayed data, inject misleading alerts, or steal session credentials. This could lead to unauthorized access to sensitive security information, undermining incident detection and response capabilities. Given the trusted nature of the SIEM environment, attackers exploiting this vulnerability could escalate privileges or move laterally within the network. The impact is particularly concerning for sectors with stringent data protection requirements under GDPR, such as finance, healthcare, and critical infrastructure, where exposure of credentials or manipulation of security logs could result in regulatory penalties and operational disruptions.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Restrict QRadar SIEM web UI access strictly to trusted and segmented network zones, minimizing exposure to untrusted users. 2) Enforce the principle of least privilege by limiting user roles and permissions within QRadar to reduce the number of authenticated users capable of injecting malicious scripts. 3) Monitor and audit user-generated content and configuration changes within the SIEM for suspicious or anomalous entries that could indicate attempted exploitation. 4) Employ web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting QRadar interfaces. 5) Regularly update and patch QRadar as IBM releases fixes; until then, consider temporary workarounds such as disabling or restricting vulnerable UI components if feasible. 6) Educate administrators and users about the risks of stored XSS and encourage vigilance when interacting with the SIEM interface. 7) Implement multi-factor authentication (MFA) to reduce the risk of credential compromise impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:50:40.773Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687669b1a83201eaaccf1d36

Added to database: 7/15/2025, 2:46:09 PM

Last enriched: 7/15/2025, 3:01:36 PM

Last updated: 7/15/2025, 8:32:34 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats