CVE-2025-36396

5.4 MEDIUM

📋 TL;DR

IBM Application Gateway versions 23.10 through 25.09 contain a cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript into the web interface. This could enable attackers to steal credentials or perform unauthorized actions within trusted user sessions. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • IBM Application Gateway
Versions: 23.10 through 25.09
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the web management interface. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider or compromised account could steal administrator credentials, hijack user sessions, and gain full control over the IBM Application Gateway management interface.

🟠

Likely Case

An authenticated attacker with basic privileges could steal session cookies or credentials from other users who view the malicious content, potentially escalating privileges.

🟢

If Mitigated

With proper input validation and output encoding implemented, the attack surface is reduced, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface. The XSS vulnerability is in the Web UI components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as per IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7256857

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin. 2. Apply the recommended fix or upgrade to a patched version. 3. Restart IBM Application Gateway services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header to web server configuration

Restrict User Input

all

Implement input validation and output encoding for all user-controllable fields

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate to the management interface
  • Monitor for suspicious JavaScript injection attempts in web logs and user input fields

🔍 How to Verify

Check if Vulnerable:

Check if IBM Application Gateway version is between 23.10 and 25.09 inclusive

Check Version:

Check version in IBM Application Gateway admin interface or configuration files

Verify Fix Applied:

Verify the version is updated beyond the vulnerable range and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript patterns in user input fields
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Suspicious POST requests with script tags or JavaScript code to web interface endpoints

SIEM Query:

source="ibm_app_gateway" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export