Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36368: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Sterling B2B Integrator

0
Medium
VulnerabilityCVE-2025-36368cvecve-2025-36368cwe-89
Published: Fri Mar 13 2026 (03/13/2026, 19:35:46 UTC)
Source: CVE Database V5
Vendor/Project: IBM
Product: Sterling B2B Integrator

Description

IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, and 6.2.1.0 through 6.2.1.1_1 are vulnerable to SQL injection. An administrative user could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:38:42 UTC

Technical Analysis

CVE-2025-36368 is an SQL injection vulnerability classified under CWE-89 affecting IBM Sterling B2B Integrator and IBM Sterling File Gateway across multiple versions (6.1.0.0 to 6.1.2.7_2, 6.2.0.0 to 6.2.0.5_1, and 6.2.1.0 to 6.2.1.1_1). The flaw arises from improper neutralization of special elements in SQL commands, allowing an attacker with administrative privileges to inject malicious SQL queries. This can lead to unauthorized access to the backend database, enabling the attacker to view, add, modify, or delete critical data. The vulnerability is remotely exploitable without user interaction but requires high privileges (administrative access). The CVSS 3.1 score of 6.5 reflects medium severity, with high impact on confidentiality and integrity but no impact on availability. No patches are currently linked, and no known exploits are reported in the wild, indicating the vulnerability is newly disclosed. The affected products are widely used in enterprise B2B data exchange and file transfer environments, making this vulnerability significant for organizations relying on IBM Sterling solutions for secure business communications.

Potential Impact

The exploitation of CVE-2025-36368 can have serious consequences for organizations using IBM Sterling B2B Integrator and File Gateway. An attacker with administrative access can manipulate backend databases, leading to unauthorized disclosure of sensitive business data, alteration of transaction records, or deletion of critical information. This compromises data confidentiality and integrity, potentially disrupting business operations and damaging trust with partners. Since these products are integral to B2B communications and file transfers, successful exploitation could affect supply chain processes, financial transactions, and regulatory compliance. Although availability is not directly impacted, the indirect effects of data corruption or loss could cause operational downtime and recovery costs. The requirement for administrative privileges limits the attack surface but also implies that insider threats or compromised admin accounts pose a significant risk. Organizations worldwide that depend on these IBM products for secure data exchange are at risk of data breaches and operational disruptions if this vulnerability is not addressed.

Mitigation Recommendations

Organizations should immediately assess their deployment of IBM Sterling B2B Integrator and File Gateway to identify affected versions. Since no patches are currently linked, administrators should implement strict access controls to limit administrative privileges only to trusted personnel and monitor administrative activities for suspicious behavior. Employ network segmentation and firewall rules to restrict access to management interfaces from untrusted networks. Enable detailed logging and alerting on database queries and administrative commands to detect potential exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected interfaces. Regularly review and update credentials, enforce multi-factor authentication for administrative access, and conduct security awareness training to reduce insider threat risks. Stay informed on IBM security advisories for forthcoming patches or updates and apply them promptly once available. Conduct penetration testing and vulnerability assessments focusing on SQL injection vectors in the affected systems to validate mitigation effectiveness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ibm
Date Reserved
2025-04-15T21:16:55.332Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b4732e2f860ef943a92616

Added to database: 3/13/2026, 8:27:26 PM

Last enriched: 3/21/2026, 12:38:42 AM

Last updated: 4/28/2026, 7:25:59 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses