CVE-2025-33097
📋 TL;DR
IBM QRadar SIEM versions 7.5 through 7.5.0 UP12 IF02 contain a stored cross-site scripting vulnerability that allows authenticated users to inject malicious JavaScript into the web interface. This could enable attackers to steal credentials or perform unauthorized actions within authenticated sessions. Only authenticated users can exploit this vulnerability.
💻 Affected Systems
- IBM QRadar SIEM
📦 What is this software?
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
Qradar Security Information And Event Manager by Ibm
View all CVEs affecting Qradar Security Information And Event Manager →
⚠️ Risk & Real-World Impact
Worst Case
An authenticated malicious insider or compromised account could inject JavaScript that captures administrator credentials, leading to full system compromise and data exfiltration.
Likely Case
Authenticated attackers could create malicious dashboards or alerts that execute JavaScript in other users' browsers, potentially stealing session tokens or performing unauthorized actions.
If Mitigated
With proper input validation and output encoding, the JavaScript would be rendered harmless as text rather than executable code.
🎯 Exploit Status
Exploitation requires authenticated access to the QRadar web interface. The attack involves injecting JavaScript into fields that are then rendered in other users' browsers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply fix as per IBM Security Bulletin
Vendor Advisory: https://www.ibm.com/support/pages/node/7239755
Restart Required: Yes
Instructions:
1. Review IBM Security Bulletin. 2. Apply the recommended fix or upgrade to a non-vulnerable version. 3. Restart QRadar services as required. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input validation for all user-controllable fields in the QRadar web interface
Content Security Policy
allImplement strict Content Security Policy headers to limit script execution
🧯 If You Can't Patch
- Restrict user permissions to minimum required levels to limit potential attackers
- Implement network segmentation to isolate QRadar from other critical systems
🔍 How to Verify
Check if Vulnerable:
Check QRadar version via Admin > System and License Management > Deployment Status. If version is between 7.5 and 7.5.0 UP12 IF02 inclusive, system is vulnerable.
Check Version:
ssh admin@qradar-host 'sudo /opt/qradar/bin/myver -v'
Verify Fix Applied:
After applying IBM's fix, verify the version shows as patched and test that JavaScript injection in user-controllable fields is properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript patterns in QRadar web logs
- Multiple failed login attempts followed by successful authentication and UI modifications
Network Indicators:
- Unusual outbound connections from QRadar server following user interaction with web interface
SIEM Query:
source="qradar" AND (eventDescription="XSS" OR message CONTAINS "script" OR message CONTAINS "javascript")