CVE-2025-36354

IBM · IBM Security Verify Access, IBM Security Verify Access Docker

A high-severity vulnerability has been identified in key IBM Security Verify Access products, which are used for identity and access management.

Executive summary

A high-severity vulnerability has been identified in key IBM Security Verify Access products, which are used for identity and access management. This flaw could allow an attacker to inject malicious code, potentially leading to the takeover of administrative accounts and granting unauthorized access to critical business applications and sensitive data. Organizations are urged to apply the vendor-provided security patches immediately to mitigate this significant risk.

Vulnerability

The vulnerability is a stored cross-site scripting (XSS) flaw within the product's administrative web interface. An attacker with low-level privileges can inject a malicious script into a data field (e.g., a user profile setting) that is stored by the application. When a privileged administrator views the page containing this malicious data, the script executes within the context of the administrator's browser, potentially allowing the attacker to steal session cookies, impersonate the administrator, and gain full control over the access management platform.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Successful exploitation could have a severe impact on the business by compromising the core of the organization's identity and access management infrastructure. An attacker with administrative control over IBM Security Verify Access could create rogue user accounts, escalate privileges for existing accounts, bypass authentication controls for integrated applications, and access or exfiltrate sensitive data. This could lead to a widespread data breach, regulatory fines, reputational damage, and significant disruption to business operations.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by IBM across all affected instances immediately. Priority should be given to internet-facing systems. After patching, review administrative access logs for any unusual or unauthorized activity that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes inspecting web server and application logs for suspicious input containing HTML or script tags in user-configurable fields. Monitor for anomalous administrative activities, such as user creation or permission changes originating from unexpected IP addresses or occurring at unusual times. Configure Web Application Firewall (WAF) signatures to detect and block XSS attack patterns targeting the affected products.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the administrative interface to a limited set of trusted IP addresses, such as a secure management bastion host. Enforce mandatory multi-factor authentication (MFA) for all administrative accounts to make session hijacking more difficult to execute successfully.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score and the critical role of IBM Security Verify Access in enterprise security, we strongly recommend that organizations treat this vulnerability with high urgency. The remediation plan should be executed immediately, prioritizing the patching of all vulnerable systems. Although this CVE is not currently on the CISA KEV list, its potential impact warrants immediate action to prevent the compromise of the organization's entire identity and access management framework and the sensitive applications it protects.