CVE-2025-36132: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Planning Analytics Local
IBM Planning Analytics Local 2.0.0 through 2.0.106 and 2.1.0 through 2.1.13 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
AI Analysis
Technical Summary
CVE-2025-36132 is a medium-severity cross-site scripting (XSS) vulnerability affecting IBM Planning Analytics Local versions 2.0.0 through 2.0.106 and 2.1.0 through 2.1.13. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an authenticated user to inject arbitrary JavaScript code into the web user interface. This injected script executes within the context of the trusted session, potentially altering the intended functionality of the application. The exploitation requires the attacker to have valid credentials (authenticated user) and some user interaction (UI:R). The vulnerability has a CVSS 3.1 base score of 5.4, reflecting a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and privileges required are low (PR:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity (C:L, I:L) but not availability (A:N). Although no known exploits are currently reported in the wild, the vulnerability could lead to credential disclosure or session hijacking if exploited, as the attacker can execute scripts that manipulate the web UI or steal sensitive data within the trusted session. IBM Planning Analytics Local is a business analytics and planning software used by enterprises for financial and operational planning, making this vulnerability relevant for organizations relying on this product for critical business functions.
Potential Impact
For European organizations using IBM Planning Analytics Local, this vulnerability poses a risk to the confidentiality and integrity of sensitive financial and operational data. An attacker with valid user credentials could exploit the XSS flaw to execute malicious scripts that may steal session tokens, credentials, or manipulate data displayed in the web interface. This could lead to unauthorized data disclosure, fraudulent financial reporting, or unauthorized changes to planning data. Given the nature of the product, such impacts could disrupt business decision-making processes and damage organizational trust. Additionally, if exploited in a multi-tenant environment or where sensitive personal data is processed, this could have regulatory implications under GDPR, potentially resulting in fines and reputational damage. The requirement for authentication limits the attack surface to insiders or compromised accounts, but the low complexity and network accessibility mean that phishing or credential theft could facilitate exploitation. The absence of known exploits suggests that immediate widespread attacks are unlikely but does not preclude targeted attacks against high-value European enterprises.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify and apply any available patches or updates from IBM once released, as no patch links are currently provided. 2) Enforce strict access controls and monitor user accounts for suspicious activity to reduce the risk of credential compromise, since exploitation requires authentication. 3) Implement web application firewalls (WAFs) with custom rules to detect and block malicious script injections targeting the IBM Planning Analytics Local web UI. 4) Conduct regular security awareness training to prevent phishing attacks that could lead to credential theft. 5) Review and harden input validation and output encoding configurations in the application environment if customization is possible. 6) Monitor logs and network traffic for unusual patterns indicative of XSS exploitation attempts. 7) Consider isolating the IBM Planning Analytics Local environment from less trusted networks and restrict access to trusted users only. 8) Prepare incident response plans specifically addressing potential XSS exploitation scenarios to minimize impact if an attack occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Italy
CVE-2025-36132: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Planning Analytics Local
Description
IBM Planning Analytics Local 2.0.0 through 2.0.106 and 2.1.0 through 2.1.13 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
AI-Powered Analysis
Technical Analysis
CVE-2025-36132 is a medium-severity cross-site scripting (XSS) vulnerability affecting IBM Planning Analytics Local versions 2.0.0 through 2.0.106 and 2.1.0 through 2.1.13. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an authenticated user to inject arbitrary JavaScript code into the web user interface. This injected script executes within the context of the trusted session, potentially altering the intended functionality of the application. The exploitation requires the attacker to have valid credentials (authenticated user) and some user interaction (UI:R). The vulnerability has a CVSS 3.1 base score of 5.4, reflecting a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and privileges required are low (PR:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality and integrity (C:L, I:L) but not availability (A:N). Although no known exploits are currently reported in the wild, the vulnerability could lead to credential disclosure or session hijacking if exploited, as the attacker can execute scripts that manipulate the web UI or steal sensitive data within the trusted session. IBM Planning Analytics Local is a business analytics and planning software used by enterprises for financial and operational planning, making this vulnerability relevant for organizations relying on this product for critical business functions.
Potential Impact
For European organizations using IBM Planning Analytics Local, this vulnerability poses a risk to the confidentiality and integrity of sensitive financial and operational data. An attacker with valid user credentials could exploit the XSS flaw to execute malicious scripts that may steal session tokens, credentials, or manipulate data displayed in the web interface. This could lead to unauthorized data disclosure, fraudulent financial reporting, or unauthorized changes to planning data. Given the nature of the product, such impacts could disrupt business decision-making processes and damage organizational trust. Additionally, if exploited in a multi-tenant environment or where sensitive personal data is processed, this could have regulatory implications under GDPR, potentially resulting in fines and reputational damage. The requirement for authentication limits the attack surface to insiders or compromised accounts, but the low complexity and network accessibility mean that phishing or credential theft could facilitate exploitation. The absence of known exploits suggests that immediate widespread attacks are unlikely but does not preclude targeted attacks against high-value European enterprises.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify and apply any available patches or updates from IBM once released, as no patch links are currently provided. 2) Enforce strict access controls and monitor user accounts for suspicious activity to reduce the risk of credential compromise, since exploitation requires authentication. 3) Implement web application firewalls (WAFs) with custom rules to detect and block malicious script injections targeting the IBM Planning Analytics Local web UI. 4) Conduct regular security awareness training to prevent phishing attacks that could lead to credential theft. 5) Review and harden input validation and output encoding configurations in the application environment if customization is possible. 6) Monitor logs and network traffic for unusual patterns indicative of XSS exploitation attempts. 7) Consider isolating the IBM Planning Analytics Local environment from less trusted networks and restrict access to trusted users only. 8) Prepare incident response plans specifically addressing potential XSS exploitation scenarios to minimize impact if an attack occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:19.007Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dc412b4167b98bea01ab91
Added to database: 9/30/2025, 8:44:27 PM
Last enriched: 9/30/2025, 8:45:17 PM
Last updated: 10/1/2025, 12:09:20 AM
Views: 4
Related Threats
CVE-2025-11153: JIT miscompilation in the JavaScript Engine: JIT component in Mozilla Firefox
UnknownCVE-2025-11152: Sandbox escape due to integer overflow in the Graphics: Canvas2D component in Mozilla Firefox
UnknownCVE-2025-10859: Data stored in cookies for non-HTML content while browsing Incognito could be viewed after closing private tabs in Mozilla Firefox for iOS
MediumCVE-2025-56301: n/a
UnknownCVE-2025-56207: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.