CVE-2025-36042 (GCVE-0-2025-36042)
Vulnerability from cvelistv5
Published
2025-08-22 14:55
Modified
2025-08-22 15:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
IBM QRadar SIEM 7.5 through 7.5.0 Dashboard is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | https://www.ibm.com/support/pages/node/7242869 | Vendor Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | QRadar SIEM |
Version: 7.5 ≤ 7.5.0 Update Pack 13 cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:* cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_13:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-36042", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-22T15:04:58.211621Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-22T15:05:10.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_13:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "QRadar SIEM", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "7.5.0 Update Pack 13", "status": "affected", "version": "7.5", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "John Zuccato, Rodney Ryan, Chris Shepherd, Vince Dragnea, Ben Goodspeed, Dawid Bak" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM QRadar SIEM 7.5 through 7.5.0\u0026nbsp;Dashboard is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." } ], "value": "IBM QRadar SIEM 7.5 through 7.5.0\u00a0Dashboard is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-22T14:55:01.862Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7242869" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIBM encourages customers to update their systems promptly.\u003c/p\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eProduct\u003c/td\u003e\u003ctd\u003eVersion\u003c/td\u003e\u003ctd\u003eFix\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eIBM QRadar SIEM\u003c/td\u003e\u003ctd\u003e\u0026nbsp;7.5.0\u003c/td\u003e\u003ctd\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/fixcentral/swg/selectFixes?fixids=7.5.0-QRADAR-QRSIEM-20250819010639INT\u0026amp;product=ibm%2FOther%20software%2FIBM%20QRadar%20Network%20Insights\u0026amp;source=dbluesearch\u0026amp;mhsrc=ibmsearch_a\u0026amp;mhq=UpdatePackage%2013%20Interim%20Fix%2003\u0026amp;function=fixId\u0026amp;parent=IBM%20Security\"\u003eQRadar 7.5.0 UP13 IF01\u003c/a\u003e\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eQRadar Incident Forensics\u003c/td\u003e\u003ctd\u003e\u0026nbsp;7.5.0\u003c/td\u003e\u003ctd\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/fixcentral/swg/selectFixes?fixids=7.5.0-QRADAR-QIFSFS-20250819010639INT\u0026amp;product=ibm%2FOther%20software%2FIBM%20Security%20QRadar%20Incident%20Forensics\u0026amp;source=dbluesearch\u0026amp;mhsrc=ibmsearch_a\u0026amp;mhq=UpdatePackage%2013%20Interim%20Fix%2003\u0026amp;function=fixId\u0026amp;parent=IBM%20Security\"\u003eQIF 7.5.0 UP13 IF01\u003c/a\u003e\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\n\n\u003cbr\u003e" } ], "value": "IBM encourages customers to update their systems promptly.\n\nProductVersionFixIBM QRadar SIEM\u00a07.5.0 QRadar 7.5.0 UP13 IF01 https://www.ibm.com/support/fixcentral/swg/selectFixes QRadar Incident Forensics\u00a07.5.0 QIF 7.5.0 UP13 IF01 https://www.ibm.com/support/fixcentral/swg/selectFixes" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM QRadar SIEM cross-site scripting", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2025-36042", "datePublished": "2025-08-22T14:55:01.862Z", "dateReserved": "2025-04-15T21:16:10.568Z", "dateUpdated": "2025-08-22T15:05:10.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-36042\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2025-08-22T15:15:32.483\",\"lastModified\":\"2025-09-15T19:53:14.617\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IBM QRadar SIEM 7.5 through 7.5.0\u00a0Dashboard is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\"},{\"lang\":\"es\",\"value\":\"El panel de control de IBM QRadar SIEM 7.5 a 7.5.0 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a un usuario autenticado incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA565E58-47AB-4F4C-8091-C8DA997D99D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14015AD4-E2BE-474C-95C8-76E4EDA55D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A25EFDA-34EA-4BDD-B90A-135ADBB5DAFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"324C0F46-FDB7-45E1-BC8D-E76575D400B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE504F7-BAD8-47EF-B2EB-AC915B2DE3B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC31DC1D-0C16-4BFC-B417-95F231BFD4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E36C5D-890F-4596-BBC9-F08CC9655B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"055F53F9-0919-4A5C-BA8E-CC50B57813DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD91D767-05EC-4739-AE75-01DA3E4E0514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30E5913-FFAB-4682-AFD9-D89DE56E3822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE3007C7-43AA-4504-8AF8-68678D03052B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E5B3AC8-6969-4FC5-851B-6142695269E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"7306945B-5E03-47EB-9805-1270BEC06419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_incident_forensics:7.5.0:update_pack_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AED2CE0-64CE-4D07-9A76-81808C294718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACA17CC-8B71-4E71-B075-BFFB65AD989C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6ADD3A-99BC-495F-9835-92D16DF18FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C899CFD-26F5-43FA-A39E-7196E2929AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C534E65-D418-4A5E-B326-F449337C0408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F6494F-EC1B-4963-908A-88190E5BF835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"289027A2-178C-45DE-A86F-1207F23D13B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5047AECF-879B-427A-ACF7-ECB10965E1B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F4014E8-42E2-4B76-B2DA-8B50929A4AB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0A459A-C74A-4E18-83B3-4C29D47D2C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"721EFDD7-EE35-430C-AF17-C54BDB10434E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C3D4D7E-0B57-47E3-BD16-5BBCE05063F5\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7242869\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-36042\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-22T15:04:58.211621Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-22T15:05:04.274Z\"}}], \"cna\": {\"title\": \"IBM QRadar SIEM cross-site scripting\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"John Zuccato, Rodney Ryan, Chris Shepherd, Vince Dragnea, Ben Goodspeed, Dawid Bak\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*\", \"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_13:*:*:*:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"QRadar SIEM\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5.0 Update Pack 13\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"IBM encourages customers to update their systems promptly.\\n\\nProductVersionFixIBM QRadar SIEM\\u00a07.5.0 QRadar 7.5.0 UP13 IF01 https://www.ibm.com/support/fixcentral/swg/selectFixes QRadar Incident Forensics\\u00a07.5.0 QIF 7.5.0 UP13 IF01 https://www.ibm.com/support/fixcentral/swg/selectFixes\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIBM encourages customers to update their systems promptly.\u003c/p\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eProduct\u003c/td\u003e\u003ctd\u003eVersion\u003c/td\u003e\u003ctd\u003eFix\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eIBM QRadar SIEM\u003c/td\u003e\u003ctd\u003e\u0026nbsp;7.5.0\u003c/td\u003e\u003ctd\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.ibm.com/support/fixcentral/swg/selectFixes?fixids=7.5.0-QRADAR-QRSIEM-20250819010639INT\u0026amp;product=ibm%2FOther%20software%2FIBM%20QRadar%20Network%20Insights\u0026amp;source=dbluesearch\u0026amp;mhsrc=ibmsearch_a\u0026amp;mhq=UpdatePackage%2013%20Interim%20Fix%2003\u0026amp;function=fixId\u0026amp;parent=IBM%20Security\\\"\u003eQRadar 7.5.0 UP13 IF01\u003c/a\u003e\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eQRadar Incident Forensics\u003c/td\u003e\u003ctd\u003e\u0026nbsp;7.5.0\u003c/td\u003e\u003ctd\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.ibm.com/support/fixcentral/swg/selectFixes?fixids=7.5.0-QRADAR-QIFSFS-20250819010639INT\u0026amp;product=ibm%2FOther%20software%2FIBM%20Security%20QRadar%20Incident%20Forensics\u0026amp;source=dbluesearch\u0026amp;mhsrc=ibmsearch_a\u0026amp;mhq=UpdatePackage%2013%20Interim%20Fix%2003\u0026amp;function=fixId\u0026amp;parent=IBM%20Security\\\"\u003eQIF 7.5.0 UP13 IF01\u003c/a\u003e\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7242869\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IBM QRadar SIEM 7.5 through 7.5.0\\u00a0Dashboard is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IBM QRadar SIEM 7.5 through 7.5.0\u0026nbsp;Dashboard is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-08-22T14:55:01.862Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-36042\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-22T15:05:10.392Z\", \"dateReserved\": \"2025-04-15T21:16:10.568Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2025-08-22T14:55:01.862Z\", \"assignerShortName\": \"ibm\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…