CVE-2025-36000

4.4 MEDIUM

📋 TL;DR

IBM WebSphere Application Server Liberty versions 17.0.0.3 through 25.0.0.8 contain a stored cross-site scripting vulnerability that allows privileged users to inject malicious JavaScript into the web interface. This could enable attackers to steal credentials or perform unauthorized actions within authenticated sessions. Organizations running affected Liberty versions are at risk.

💻 Affected Systems

Products:
  • IBM WebSphere Application Server Liberty
Versions: 17.0.0.3 through 25.0.0.8
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged user access to exploit. All deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker steals administrator credentials, gains full control of the application server, and compromises the entire environment.

🟠

Likely Case

Privileged user with malicious intent steals session cookies or credentials from other users, leading to account takeover and data exposure.

🟢

If Mitigated

With proper input validation and output encoding, the attack is prevented, though the underlying vulnerability remains.

🌐 Internet-Facing: MEDIUM - While exploitation requires privileged access, internet-facing instances increase attack surface and potential for credential theft.
🏢 Internal Only: MEDIUM - Internal privileged users could exploit this to escalate privileges or steal credentials from other internal users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated privileged access to the WebSphere Liberty administrative interface. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.0.0.9 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7242026

Restart Required: No

Instructions:

1. Download and install IBM WebSphere Application Server Liberty version 25.0.0.9 or later. 2. Apply the fix pack to existing installations. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement strict input validation and output encoding for all user-supplied content in the WebSphere Liberty administrative interface.

Content Security Policy

all

Implement a strict Content Security Policy (CSP) header to restrict execution of inline JavaScript and external scripts.

🧯 If You Can't Patch

  • Restrict administrative access to only trusted, necessary users with strong authentication.
  • Implement web application firewall (WAF) rules to detect and block XSS payloads in administrative interfaces.

🔍 How to Verify

Check if Vulnerable:

Check the WebSphere Liberty version using the server command or configuration files. Versions between 17.0.0.3 and 25.0.0.8 inclusive are vulnerable.

Check Version:

server version

Verify Fix Applied:

Verify the installed version is 25.0.0.9 or later. Test administrative interface for proper input validation and output encoding.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative interface activity
  • Multiple failed login attempts followed by successful privileged access
  • Suspicious JavaScript payloads in request logs

Network Indicators:

  • Unusual outbound connections from the WebSphere server following administrative access
  • Traffic patterns suggesting credential harvesting

SIEM Query:

source="websphere" AND (event="admin_login" OR event="privileged_action") AND (payload CONTAINS "<script>" OR payload CONTAINS "javascript:")

🔗 References

📤 Share & Export