CVE-2025-36397

5.4 MEDIUM

📋 TL;DR

IBM Application Gateway versions 23.10 through 25.09 are vulnerable to HTML injection, allowing attackers to inject malicious HTML that executes in users' browsers. This affects organizations using these versions of IBM Application Gateway, potentially compromising users who access the vulnerable interface.

💻 Affected Systems

Products:
  • IBM Application Gateway
Versions: 23.10 through 25.09
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable unless specifically patched or workarounds applied.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions on behalf of authenticated users, potentially leading to account compromise or data theft.

🟠

Likely Case

Attackers inject malicious HTML/JavaScript to perform session hijacking, credential theft, or defacement of the application interface.

🟢

If Mitigated

With proper input validation and output encoding, the injected content would be rendered as plain text rather than executable code, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

HTML injection typically requires minimal technical skill and can be exploited through web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.09 with fix or later versions

Vendor Advisory: https://www.ibm.com/support/pages/node/7256857

Restart Required: Yes

Instructions:

1. Review IBM advisory. 2. Apply the latest fix pack for IBM Application Gateway 25.09 or upgrade to a version beyond 25.09. 3. Restart the application gateway service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation to reject or sanitize HTML content in user inputs.

Output Encoding

all

Ensure all user-controlled data is properly encoded before being rendered in HTML responses.

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with HTML injection protection rules.
  • Restrict access to the vulnerable interface to trusted networks only.

🔍 How to Verify

Check if Vulnerable:

Check IBM Application Gateway version via administrative interface or configuration files. If version is between 23.10 and 25.09 inclusive, it is vulnerable.

Check Version:

Check version in IBM Application Gateway admin console or configuration files (exact command varies by deployment).

Verify Fix Applied:

Verify the version is updated to 25.09 with fix or later, and test that HTML injection attempts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML/script patterns in user input logs
  • Multiple failed injection attempts in web logs

Network Indicators:

  • HTTP requests containing suspicious HTML tags or script elements to the application gateway

SIEM Query:

Search for web requests containing patterns like '<script>', 'javascript:', or HTML entities to the IBM Application Gateway endpoint.

🔗 References

📤 Share & Export