CVE-2025-36352: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM License Metric Tool
IBM License Metric Tool 9.2.0 through 9.2.40 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
AI Analysis
Technical Summary
CVE-2025-36352 is a stored cross-site scripting (XSS) vulnerability affecting IBM License Metric Tool versions 9.2.0 through 9.2.40. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an authenticated user to inject arbitrary JavaScript code into the web user interface. Because the malicious script is stored persistently, it can execute whenever a legitimate user accesses the affected page, potentially altering intended functionality. The exploitation does not require user interaction beyond authentication, and the attacker can leverage the trusted session to disclose sensitive information such as user credentials. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, and a scope change. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The IBM License Metric Tool is used for software license management and compliance tracking, making it a critical asset in enterprise environments. The vulnerability's exploitation could lead to unauthorized access escalation or data leakage within organizations relying on this tool for license governance.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of license management data and potentially broader enterprise systems if credentials are compromised. Since the IBM License Metric Tool is often integrated into IT asset management and compliance workflows, exploitation could disrupt license compliance reporting, leading to regulatory and financial repercussions. The ability to inject persistent scripts could enable attackers to harvest session tokens or credentials, facilitating lateral movement or privilege escalation within the network. Given the trusted nature of the application, users may be more susceptible to executing malicious scripts unknowingly. This risk is heightened in sectors with strict compliance requirements such as finance, healthcare, and government institutions prevalent across Europe. Additionally, the vulnerability requires authentication, so insider threats or compromised accounts could be leveraged to exploit it, emphasizing the need for strong identity and access management controls.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the IBM License Metric Tool to only trusted and necessary personnel, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of account compromise. 2. Implement strict input validation and output encoding on all user-supplied data fields within the web UI to prevent injection of malicious scripts. 3. Monitor and audit user activities and logs for unusual behavior indicative of exploitation attempts. 4. Network segmentation should be employed to isolate the License Metric Tool from critical systems to limit lateral movement in case of compromise. 5. Since no official patches are linked yet, organizations should engage with IBM support for any available hotfixes or workarounds and apply them promptly once released. 6. Educate users about the risks of XSS and encourage cautious behavior when interacting with the tool’s web interface. 7. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this application. 8. Regularly review and update the tool to the latest versions once patches addressing this vulnerability are available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-36352: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM License Metric Tool
Description
IBM License Metric Tool 9.2.0 through 9.2.40 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
AI-Powered Analysis
Technical Analysis
CVE-2025-36352 is a stored cross-site scripting (XSS) vulnerability affecting IBM License Metric Tool versions 9.2.0 through 9.2.40. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing an authenticated user to inject arbitrary JavaScript code into the web user interface. Because the malicious script is stored persistently, it can execute whenever a legitimate user accesses the affected page, potentially altering intended functionality. The exploitation does not require user interaction beyond authentication, and the attacker can leverage the trusted session to disclose sensitive information such as user credentials. The CVSS v3.1 base score is 6.4 (medium severity), reflecting network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, and a scope change. The vulnerability impacts confidentiality and integrity but not availability. No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. The IBM License Metric Tool is used for software license management and compliance tracking, making it a critical asset in enterprise environments. The vulnerability's exploitation could lead to unauthorized access escalation or data leakage within organizations relying on this tool for license governance.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of license management data and potentially broader enterprise systems if credentials are compromised. Since the IBM License Metric Tool is often integrated into IT asset management and compliance workflows, exploitation could disrupt license compliance reporting, leading to regulatory and financial repercussions. The ability to inject persistent scripts could enable attackers to harvest session tokens or credentials, facilitating lateral movement or privilege escalation within the network. Given the trusted nature of the application, users may be more susceptible to executing malicious scripts unknowingly. This risk is heightened in sectors with strict compliance requirements such as finance, healthcare, and government institutions prevalent across Europe. Additionally, the vulnerability requires authentication, so insider threats or compromised accounts could be leveraged to exploit it, emphasizing the need for strong identity and access management controls.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the IBM License Metric Tool to only trusted and necessary personnel, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of account compromise. 2. Implement strict input validation and output encoding on all user-supplied data fields within the web UI to prevent injection of malicious scripts. 3. Monitor and audit user activities and logs for unusual behavior indicative of exploitation attempts. 4. Network segmentation should be employed to isolate the License Metric Tool from critical systems to limit lateral movement in case of compromise. 5. Since no official patches are linked yet, organizations should engage with IBM support for any available hotfixes or workarounds and apply them promptly once released. 6. Educate users about the risks of XSS and encourage cautious behavior when interacting with the tool’s web interface. 7. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this application. 8. Regularly review and update the tool to the latest versions once patches addressing this vulnerability are available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:54.209Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68da982a15f3c5a417dc16ac
Added to database: 9/29/2025, 2:31:06 PM
Last enriched: 9/29/2025, 2:31:45 PM
Last updated: 10/1/2025, 12:09:21 AM
Views: 11
Related Threats
CVE-2025-11153: JIT miscompilation in the JavaScript Engine: JIT component in Mozilla Firefox
HighCVE-2025-11152: Sandbox escape due to integer overflow in the Graphics: Canvas2D component in Mozilla Firefox
HighCVE-2025-10859: Data stored in cookies for non-HTML content while browsing Incognito could be viewed after closing private tabs in Mozilla Firefox for iOS
MediumCVE-2025-56301: n/a
HighCVE-2025-56207: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.