CVE-2025-36408
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-20

Last updated on: 2026-01-26

Assigner: IBM Corporation

Description
IBM ApplinX 11.1 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-20
Last Modified
2026-01-26
Generated
2026-05-06
AI Q&A
2026-01-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ibm applinx 11.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) flaw in IBM ApplinX version 11.1. It allows an authenticated user to inject arbitrary JavaScript code into the Web UI, which can change how the application functions. This injected code can lead to the disclosure of user credentials during a trusted session. [1]


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker with valid credentials to inject malicious JavaScript into the application’s Web UI. This can alter the intended functionality and potentially expose your credentials, compromising confidentiality and integrity within a trusted session. [1]


What immediate steps should I take to mitigate this vulnerability?

IBM recommends upgrading IBM ApplinX to the latest version 11.1 update available from Fix Central to remediate this issue. No workarounds or mitigations are provided. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows disclosure of user credentials within a trusted session, which could lead to unauthorized access to sensitive data. This type of security flaw may impact compliance with standards and regulations such as GDPR and HIPAA that require protection of personal and sensitive information. However, no specific details on compliance impact are provided. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart