CVE-2025-36397: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Application Gateway
IBM Application Gateway 23.10 through 25.09 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
AI Analysis
Technical Summary
CVE-2025-36397 is an HTML injection vulnerability classified under CWE-80, affecting IBM Application Gateway versions 23.10 through 25.09. This vulnerability arises from improper neutralization of script-related HTML tags, allowing an authenticated remote attacker to inject malicious HTML code into web pages served by the gateway. When a victim views the compromised page, the injected code executes within the security context of the hosting site, potentially enabling theft of sensitive information, session hijacking, or manipulation of displayed content. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to be exploited, which limits its ease of exploitation. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The CVSS 3.1 base score is 5.4, indicating medium severity. No public exploit code or active exploitation has been reported to date. The lack of a patch link suggests that remediation may require vendor updates or configuration changes. This vulnerability is particularly relevant for organizations relying on IBM Application Gateway for secure web traffic management, as it could undermine trust in web applications and expose users to client-side attacks.
Potential Impact
For European organizations, this vulnerability poses a risk to confidentiality and integrity of data processed through IBM Application Gateway, especially in sectors where sensitive data is handled such as finance, healthcare, and government. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. While availability impact is negligible, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. Organizations using affected versions may face increased risk of targeted attacks exploiting this vulnerability to gain footholds or escalate privileges within their networks. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk from insider threats or phishing campaigns. Given IBM Application Gateway's role in managing web traffic and security policies, this vulnerability could also be leveraged to bypass security controls or inject malicious content into trusted web portals.
Mitigation Recommendations
European organizations should immediately verify if they are running IBM Application Gateway versions 23.10 through 25.09 and plan to upgrade to a patched version once available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent injection of malicious HTML or scripts. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Limit user privileges to the minimum necessary to reduce the attack surface. Monitor web traffic and logs for unusual activity indicative of attempted HTML injection or XSS attacks. Educate users about the risks of interacting with suspicious links or content, especially in authenticated sessions. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting IBM Application Gateway. Coordinate with IBM support to obtain official patches or workarounds and stay informed about any emerging exploit reports.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36397: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in IBM Application Gateway
Description
IBM Application Gateway 23.10 through 25.09 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
AI-Powered Analysis
Technical Analysis
CVE-2025-36397 is an HTML injection vulnerability classified under CWE-80, affecting IBM Application Gateway versions 23.10 through 25.09. This vulnerability arises from improper neutralization of script-related HTML tags, allowing an authenticated remote attacker to inject malicious HTML code into web pages served by the gateway. When a victim views the compromised page, the injected code executes within the security context of the hosting site, potentially enabling theft of sensitive information, session hijacking, or manipulation of displayed content. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R) to be exploited, which limits its ease of exploitation. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The CVSS 3.1 base score is 5.4, indicating medium severity. No public exploit code or active exploitation has been reported to date. The lack of a patch link suggests that remediation may require vendor updates or configuration changes. This vulnerability is particularly relevant for organizations relying on IBM Application Gateway for secure web traffic management, as it could undermine trust in web applications and expose users to client-side attacks.
Potential Impact
For European organizations, this vulnerability poses a risk to confidentiality and integrity of data processed through IBM Application Gateway, especially in sectors where sensitive data is handled such as finance, healthcare, and government. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. While availability impact is negligible, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. Organizations using affected versions may face increased risk of targeted attacks exploiting this vulnerability to gain footholds or escalate privileges within their networks. The requirement for authentication and user interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk from insider threats or phishing campaigns. Given IBM Application Gateway's role in managing web traffic and security policies, this vulnerability could also be leveraged to bypass security controls or inject malicious content into trusted web portals.
Mitigation Recommendations
European organizations should immediately verify if they are running IBM Application Gateway versions 23.10 through 25.09 and plan to upgrade to a patched version once available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent injection of malicious HTML or scripts. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. Limit user privileges to the minimum necessary to reduce the attack surface. Monitor web traffic and logs for unusual activity indicative of attempted HTML injection or XSS attacks. Educate users about the risks of interacting with suspicious links or content, especially in authenticated sessions. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting IBM Application Gateway. Coordinate with IBM support to obtain official patches or workarounds and stay informed about any emerging exploit reports.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ibm
- Date Reserved
- 2025-04-15T21:16:59.139Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696fa0dc4623b1157c3be2cb
Added to database: 1/20/2026, 3:35:56 PM
Last enriched: 1/20/2026, 3:50:53 PM
Last updated: 1/20/2026, 7:08:51 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66803: n/a
HighCVE-2025-56005: n/a
CriticalCVE-2025-67263: n/a
HighCVE-2025-33231: CWE-427 Uncontrolled Search Path Element in NVIDIA CUDA Toolkit
MediumCVE-2025-33230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA CUDA Toolkit
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.