CVE-2025-36121: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM OpenPages
IBM OpenPages 9.1 and 9.0 is vulnerable to HTML injection. A remotely authenticated attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
AI Analysis
Technical Summary
CVE-2025-36121 is an identified vulnerability in IBM OpenPages versions 9.0 and 9.1, classified under CWE-80 for improper neutralization of script-related HTML tags, commonly known as a basic cross-site scripting (XSS) flaw. This vulnerability permits a remotely authenticated attacker with limited privileges to inject malicious HTML or script code into web pages rendered by the OpenPages application. When a legitimate user views the injected content, the malicious code executes within the security context of the hosting site, potentially allowing the attacker to steal session tokens, manipulate the user interface, or perform actions on behalf of the victim. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based with low attack complexity, requires privileges (authenticated user), and user interaction (victim must view the malicious content). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable part. Confidentiality and integrity impacts are low, and availability is not affected. No public exploits have been reported yet, but the vulnerability poses a risk in environments where users have access to input fields or content that can be manipulated. IBM OpenPages is widely used in enterprise governance, risk, and compliance (GRC) management, making this vulnerability relevant for organizations relying on this platform for regulatory and risk processes.
Potential Impact
For European organizations, the impact of CVE-2025-36121 can be significant in sectors where IBM OpenPages is deployed for critical governance, risk, and compliance functions, such as financial services, insurance, and regulated industries. Successful exploitation could lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of user interactions, undermining trust in compliance reporting and risk assessments. Although the vulnerability requires authentication and user interaction, insider threats or compromised credentials could facilitate exploitation. The medium severity score suggests moderate risk, but the potential for lateral movement or escalation within enterprise environments elevates concern. Disruption of compliance workflows or exposure of sensitive governance data could have regulatory and reputational consequences for European firms, especially under strict data protection laws like GDPR. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2025-36121 effectively, European organizations should implement a multi-layered approach beyond generic advice: 1) Apply any available IBM patches or updates promptly once released; monitor IBM security advisories closely. 2) Enforce strict input validation and output encoding on all user-supplied data within OpenPages, particularly in fields that render HTML content. 3) Restrict user privileges to the minimum necessary, limiting the ability of authenticated users to inject or modify content that is rendered by others. 4) Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting sources of executable code. 5) Conduct regular security assessments and penetration tests focusing on web application inputs and user roles within OpenPages. 6) Educate users about the risks of interacting with suspicious content and encourage reporting of unusual behavior. 7) Monitor logs for unusual input patterns or repeated attempts to inject HTML or scripts. 8) Consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting OpenPages. These targeted measures will reduce the attack surface and limit the potential impact of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36121: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM OpenPages
Description
IBM OpenPages 9.1 and 9.0 is vulnerable to HTML injection. A remotely authenticated attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
AI-Powered Analysis
Technical Analysis
CVE-2025-36121 is an identified vulnerability in IBM OpenPages versions 9.0 and 9.1, classified under CWE-80 for improper neutralization of script-related HTML tags, commonly known as a basic cross-site scripting (XSS) flaw. This vulnerability permits a remotely authenticated attacker with limited privileges to inject malicious HTML or script code into web pages rendered by the OpenPages application. When a legitimate user views the injected content, the malicious code executes within the security context of the hosting site, potentially allowing the attacker to steal session tokens, manipulate the user interface, or perform actions on behalf of the victim. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based with low attack complexity, requires privileges (authenticated user), and user interaction (victim must view the malicious content). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable part. Confidentiality and integrity impacts are low, and availability is not affected. No public exploits have been reported yet, but the vulnerability poses a risk in environments where users have access to input fields or content that can be manipulated. IBM OpenPages is widely used in enterprise governance, risk, and compliance (GRC) management, making this vulnerability relevant for organizations relying on this platform for regulatory and risk processes.
Potential Impact
For European organizations, the impact of CVE-2025-36121 can be significant in sectors where IBM OpenPages is deployed for critical governance, risk, and compliance functions, such as financial services, insurance, and regulated industries. Successful exploitation could lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of user interactions, undermining trust in compliance reporting and risk assessments. Although the vulnerability requires authentication and user interaction, insider threats or compromised credentials could facilitate exploitation. The medium severity score suggests moderate risk, but the potential for lateral movement or escalation within enterprise environments elevates concern. Disruption of compliance workflows or exposure of sensitive governance data could have regulatory and reputational consequences for European firms, especially under strict data protection laws like GDPR. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2025-36121 effectively, European organizations should implement a multi-layered approach beyond generic advice: 1) Apply any available IBM patches or updates promptly once released; monitor IBM security advisories closely. 2) Enforce strict input validation and output encoding on all user-supplied data within OpenPages, particularly in fields that render HTML content. 3) Restrict user privileges to the minimum necessary, limiting the ability of authenticated users to inject or modify content that is rendered by others. 4) Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by restricting sources of executable code. 5) Conduct regular security assessments and penetration tests focusing on web application inputs and user roles within OpenPages. 6) Educate users about the risks of interacting with suspicious content and encourage reporting of unusual behavior. 7) Monitor logs for unusual input patterns or repeated attempts to inject HTML or scripts. 8) Consider deploying web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting OpenPages. These targeted measures will reduce the attack surface and limit the potential impact of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:18.171Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ff8ac4ba6dffc5e2fe0fdb
Added to database: 10/27/2025, 3:07:48 PM
Last enriched: 11/3/2025, 4:10:42 PM
Last updated: 12/14/2025, 2:39:39 PM
Views: 192
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14663: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14662: Cross Site Scripting in code-projects Student File Management System
MediumCVE-2025-14660: Improper Access Controls in DecoCMS Mesh
MediumCVE-2025-14661: SQL Injection in itsourcecode Student Managemen System
MediumCVE-2025-14659: Command Injection in D-Link DIR-860LB1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.