Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36138: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM QRadar SIEM

0
Medium
VulnerabilityCVE-2025-36138cvecve-2025-36138cwe-79
Published: Mon Oct 27 2025 (10/27/2025, 18:47:11 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: QRadar SIEM

Description

IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI-Powered Analysis

AILast updated: 10/27/2025, 19:09:11 UTC

Technical Analysis

CVE-2025-36138 is a stored cross-site scripting vulnerability classified under CWE-79, affecting IBM QRadar SIEM versions 7.5 through 7.5.0 Update Pack 13 Independent Fix 02, specifically identified in version 7.5.0. The vulnerability arises due to improper neutralization of user-supplied input during web page generation within the QRadar web interface. An authenticated user with low privileges can embed arbitrary JavaScript code into the web UI, which is then stored and executed in the context of other users' sessions. This can lead to unauthorized actions such as credential theft, session hijacking, or manipulation of the SIEM interface, compromising the confidentiality and integrity of the system. The attack vector is network-based (remote), with low attack complexity and requiring privileges but no user interaction, and the scope is changed because the vulnerability affects other components or users beyond the attacker. The CVSS v3.1 base score is 6.4 (medium severity), reflecting the moderate impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability poses a significant risk given the critical role of QRadar SIEM in security monitoring and incident response. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of security event data and user credentials within IBM QRadar SIEM environments. Since QRadar is widely used by enterprises and critical infrastructure operators for security monitoring, exploitation could allow attackers to escalate privileges, manipulate security alerts, or exfiltrate sensitive information. This could undermine incident detection and response capabilities, potentially allowing further undetected compromise. The stored XSS nature means that once malicious code is injected, it can affect multiple users accessing the compromised interface, increasing the attack's reach. Given the medium severity and the criticality of SIEM systems, the impact on European organizations could be significant, especially in sectors like finance, energy, telecommunications, and government, where QRadar is commonly deployed.

Mitigation Recommendations

1. Restrict QRadar web UI access to trusted and minimal user groups, enforcing the principle of least privilege to limit who can inject malicious scripts. 2. Implement strict input validation and sanitization on all user inputs within the QRadar interface, if possible via configuration or custom rules. 3. Monitor web UI logs and user activity for unusual behavior indicative of XSS exploitation attempts. 4. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting QRadar interfaces. 5. Isolate QRadar management interfaces from general network access, using VPNs or jump hosts to reduce exposure. 6. Stay updated with IBM security advisories and apply patches or fixes as soon as they become available. 7. Educate users with access to QRadar about the risks of XSS and encourage reporting of suspicious UI behavior. 8. Consider deploying Content Security Policy (CSP) headers if configurable to reduce the impact of injected scripts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:19.008Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ffbf81ba6dffc5e207e335

Added to database: 10/27/2025, 6:52:49 PM

Last enriched: 10/27/2025, 7:09:11 PM

Last updated: 10/30/2025, 9:39:49 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats