Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36135: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in IBM Sterling B2B Integrator

0
Medium
VulnerabilityCVE-2025-36135cvecve-2025-36135cwe-79
Published: Fri Nov 07 2025 (11/07/2025, 18:26:57 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling B2B Integrator

Description

IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.7_1, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7_1, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI-Powered Analysis

AILast updated: 11/07/2025, 18:41:08 UTC

Technical Analysis

CVE-2025-36135 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects multiple versions of IBM Sterling B2B Integrator and IBM Sterling File Gateway. These products are widely used for business-to-business data exchange and secure file transfer. The vulnerability arises from improper neutralization of user-supplied input during web page generation in the product's web user interface. An authenticated attacker can exploit this flaw by embedding arbitrary JavaScript code into the web UI, which executes in the context of a trusted session. This can lead to unauthorized actions such as credential theft, session hijacking, or manipulation of the interface to perform unintended operations. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based, with low attack complexity, requiring privileges (authenticated user) and user interaction. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. Confidentiality and integrity impacts are low, while availability is not affected. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on these IBM products for critical B2B workflows. The lack of available patches at the time of reporting necessitates interim mitigations to reduce exposure.

Potential Impact

For European organizations, the impact of this vulnerability can be significant in environments where IBM Sterling B2B Integrator or File Gateway are deployed to manage critical business data exchanges and file transfers. Successful exploitation could lead to credential disclosure of authenticated users, potentially allowing attackers to escalate privileges or move laterally within the network. This could disrupt business operations, compromise sensitive partner data, and damage trust relationships. Since these products are often integrated into supply chain and partner communication systems, the confidentiality breach could extend beyond the organization itself. The medium severity indicates a moderate risk, but the potential for chained attacks leveraging stolen credentials increases the threat. Organizations in sectors such as manufacturing, logistics, finance, and telecommunications, which heavily rely on B2B integrations, are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.

Mitigation Recommendations

1. Monitor IBM's official channels closely for patch releases addressing CVE-2025-36135 and apply them promptly once available. 2. Restrict user privileges in the IBM Sterling B2B Integrator and File Gateway environments to the minimum necessary, limiting authenticated users who can interact with the web UI. 3. Implement strict input validation and output encoding on all user-supplied data fields within the web interface to prevent script injection. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious JavaScript payloads or unusual web UI interactions. 5. Conduct regular security audits and penetration testing focused on the web UI components to identify and remediate similar injection flaws. 6. Educate users about the risks of interacting with unexpected or suspicious UI elements and encourage reporting of anomalies. 7. Monitor logs and network traffic for signs of credential theft or session hijacking attempts related to web UI usage. 8. Consider isolating or segmenting the IBM Sterling environment to limit lateral movement if a compromise occurs. 9. Review and harden session management configurations to reduce the impact of stolen credentials. 10. Maintain an incident response plan tailored to web application attacks involving trusted sessions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.008Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e3d06dc0204d2f65bb8c3

Added to database: 11/7/2025, 6:40:06 PM

Last enriched: 11/7/2025, 6:41:08 PM

Last updated: 11/22/2025, 3:14:21 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats