Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36230: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Aspera Faspex 5

0
Medium
VulnerabilityCVE-2025-36230cvecve-2025-36230cwe-80
Published: Fri Dec 26 2025 (12/26/2025, 14:22:46 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Aspera Faspex 5

Description

IBM Aspera Faspex 5 5.0.0 through 5.0.14.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.

AI-Powered Analysis

AILast updated: 12/26/2025, 14:56:28 UTC

Technical Analysis

CVE-2025-36230 is a cross-site scripting (XSS) vulnerability classified under CWE-80, found in IBM Aspera Faspex 5 versions 5.0.0 through 5.0.14.1. The vulnerability arises due to improper neutralization of script-related HTML tags in web pages generated by the product, allowing remote attackers to inject malicious HTML or script code. When a victim views the crafted content, the injected code executes within the security context of the hosting site, potentially leading to unauthorized actions or data disclosure. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). No known exploits have been reported in the wild as of the publication date. IBM Aspera Faspex is widely used for secure file transfer in enterprise environments, making this vulnerability relevant for organizations relying on it for sensitive data exchange. The flaw can be exploited by sending crafted inputs that are improperly sanitized, leading to execution of arbitrary scripts in users’ browsers. This can facilitate session hijacking, phishing, or unauthorized actions within the application context. The vulnerability is particularly concerning in multi-tenant or shared environments where user trust boundaries are critical. The lack of an official patch link suggests that remediation may require vendor updates or configuration changes.

Potential Impact

For European organizations, the impact of CVE-2025-36230 can be significant in environments where IBM Aspera Faspex 5 is deployed for secure file transfer and collaboration. Exploitation could lead to unauthorized disclosure of sensitive information, such as session tokens or confidential file metadata, through script execution in users’ browsers. Integrity of user interactions could be compromised, enabling attackers to perform actions on behalf of victims or inject misleading content. Although availability is not affected, the breach of confidentiality and integrity could result in regulatory non-compliance, reputational damage, and potential financial losses. Organizations handling critical or regulated data (e.g., finance, healthcare, government) are at higher risk. The requirement for user interaction and low privilege reduces the likelihood of widespread automated exploitation but does not eliminate targeted phishing or social engineering attacks leveraging this vulnerability. The scope change indicates that the impact may extend beyond the immediate vulnerable component, potentially affecting other integrated systems or services within the enterprise environment.

Mitigation Recommendations

1. Monitor IBM’s official security advisories for patches addressing CVE-2025-36230 and apply them promptly once available. 2. Implement strict input validation and output encoding on all user-supplied data within IBM Aspera Faspex to prevent injection of malicious HTML or scripts. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the risk of XSS exploitation. 4. Conduct security awareness training for users to recognize and avoid interacting with suspicious links or content that could trigger the vulnerability. 5. Review and harden web application firewall (WAF) rules to detect and block attempts to inject malicious HTML or scripts targeting Faspex interfaces. 6. Limit user privileges within Faspex to the minimum necessary to reduce the impact of potential exploitation. 7. Regularly audit and monitor logs for unusual activities or indicators of attempted exploitation related to XSS. 8. Consider isolating Faspex web interfaces behind VPNs or internal networks to reduce exposure to external attackers. 9. Employ browser security features such as disabling inline scripts and enforcing same-origin policies where feasible. 10. Engage in penetration testing focused on XSS vectors to validate the effectiveness of implemented mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:42.824Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694e9f3b2bc1afab4ba470b4

Added to database: 12/26/2025, 2:44:11 PM

Last enriched: 12/26/2025, 2:56:28 PM

Last updated: 12/26/2025, 4:31:05 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats