Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33138: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Aspera Faspex

0
Medium
VulnerabilityCVE-2025-33138cvecve-2025-33138cwe-80
Published: Thu May 22 2025 (05/22/2025, 16:37:28 UTC)
Source: CVE
Vendor/Project: IBM
Product: Aspera Faspex

Description

IBM Aspera Faspex 5.0.0 through 5.0.12 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.

AI-Powered Analysis

AILast updated: 08/27/2025, 00:44:38 UTC

Technical Analysis

CVE-2025-33138 is a medium-severity vulnerability identified in IBM Aspera Faspex versions 5.0.0 through 5.0.12. The vulnerability is classified under CWE-80, which refers to improper neutralization of script-related HTML tags in a web page, commonly known as Cross-Site Scripting (XSS). Specifically, this vulnerability allows a remote attacker to inject malicious HTML code into the Faspex web interface. When a victim views the injected content, the malicious code executes within the security context of the hosting site, potentially allowing the attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, or executing arbitrary scripts in the victim's browser. The CVSS v3.1 base score is 5.4, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity to a limited extent (C:L, I:L), but does not affect availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises from insufficient input validation or output encoding in the web application, allowing HTML injection that leads to XSS attacks.

Potential Impact

For European organizations using IBM Aspera Faspex, this vulnerability poses a risk primarily to the confidentiality and integrity of data accessed through the Faspex web interface. Aspera Faspex is used for secure file transfer, often involving sensitive or regulated data. Exploitation could allow attackers to hijack user sessions, steal authentication tokens, or manipulate displayed content, potentially leading to unauthorized data access or phishing attacks targeting internal users. This could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. Since the vulnerability requires user interaction and low privileges, it could be exploited by insiders or external attackers who have limited access but can trick users into viewing malicious content. The scope change indicates that the attack could impact other components or users beyond the initially compromised context, increasing the potential reach of an attack. Although no active exploits are known yet, the presence of this vulnerability in a widely used enterprise file transfer solution means European organizations should prioritize mitigation to prevent future exploitation.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the Faspex web interface to trusted networks and users only, minimizing exposure to potential attackers. 2. Implement strict Content Security Policy (CSP) headers on the Faspex web server to limit the execution of unauthorized scripts and reduce the impact of XSS attacks. 3. Employ web application firewalls (WAFs) with rules specifically designed to detect and block malicious HTML or script injection attempts targeting Faspex. 4. Educate users on the risks of interacting with unexpected or suspicious links within the Faspex interface to reduce the likelihood of successful user interaction exploitation. 5. Monitor logs for unusual activity or repeated attempts to inject HTML or scripts. 6. Coordinate with IBM for timely patches or updates addressing this vulnerability and plan for prompt deployment once available. 7. Conduct internal security assessments and penetration tests focusing on the Faspex environment to identify any additional weaknesses related to input validation and output encoding.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T17:51:21.700Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f56360acd01a249263f5e

Added to database: 5/22/2025, 4:52:06 PM

Last enriched: 8/27/2025, 12:44:38 AM

Last updated: 10/7/2025, 1:53:09 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats