Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36121: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM OpenPages

0
Medium
VulnerabilityCVE-2025-36121cvecve-2025-36121cwe-80
Published: Mon Oct 27 2025 (10/27/2025, 14:56:07 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: OpenPages

Description

IBM OpenPages 9.1 and 9.0 is vulnerable to HTML injection. A remotely authenticated attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.

AI-Powered Analysis

AILast updated: 11/03/2025, 16:10:42 UTC

Technical Analysis

CVE-2025-36121 is an identified vulnerability in IBM OpenPages versions 9.0 and 9.1, classified under CWE-80 for improper neutralization of script-related HTML tags, commonly known as a basic cross-site scripting (XSS) flaw. This vulnerability permits a remotely authenticated attacker with limited privileges to inject malicious HTML or script code into web pages rendered by the OpenPages application. When a legitimate user views the injected content, the malicious code executes within the security context of the hosting site, potentially allowing the attacker to steal session tokens, manipulate the user interface, or perform actions on behalf of the victim. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based with low attack complexity, requires privileges (authenticated user), and user interaction (victim must view the malicious content). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable part. Confidentiality and integrity impacts are low, and availability is not affected. No public exploits have been reported yet, but the vulnerability poses a risk in environments where users have access to input fields or content that can be manipulated. IBM OpenPages is widely used in enterprise governance, risk, and compliance (GRC) management, making this vulnerability relevant for organizations relying on this platform for regulatory and risk processes.

Potential Impact

For European organizations, the impact of CVE-2025-36121 can be significant in sectors where IBM OpenPages is deployed for critical governance, risk, and compliance functions, such as financial services, insurance, and regulated industries. Successful exploitation could lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of user interactions, undermining trust in compliance reporting and risk assessments. Although the vulnerability requires authentication and user interaction, insider threats or compromised credentials could facilitate exploitation. The medium severity score suggests moderate risk, but the potential for lateral movement or escalation within enterprise environments elevates concern. Disruption of compliance workflows or exposure of sensitive governance data could have regulatory and reputational consequences for European firms, especially under strict data protection laws like GDPR. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2025-36121 effectively, European organizations should implement a multi-layered approach beyond generic advice: 1) Apply any available IBM patches or updates promptly once released; monitor IBM security advisories closely. 2) Enforce strict input validation and output encoding on all user-supplied data within OpenPages, particularly in fields that render HTML content. 3) Restrict user privileges to the minimum necessary, limiting the ability of authenticated users to inject or modify content that is rendered by others. 4) Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting sources of executable code. 5) Conduct regular security assessments and penetration tests focusing on web application inputs and user roles within OpenPages. 6) Educate users about the risks of interacting with suspicious content and encourage reporting of unusual behavior. 7) Monitor logs for unusual input patterns or repeated attempts to inject HTML or scripts. 8) Consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting OpenPages. These targeted measures will reduce the attack surface and limit the potential impact of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:18.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff8ac4ba6dffc5e2fe0fdb

Added to database: 10/27/2025, 3:07:48 PM

Last enriched: 11/3/2025, 4:10:42 PM

Last updated: 12/14/2025, 2:39:39 PM

Views: 192

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats