IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.ibm.com/support/pages/node/7171880 |
![]() ![]() |
History
Mon, 27 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 27 Jan 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | |
Title | IBM OpenPages with Watson cross-site scripting | |
First Time appeared |
Ibm
Ibm openpages With Watson |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:ibm:openpages_with_watson:8.3:*:*:*:*:*:*:* cpe:2.3:a:ibm:openpages_with_watson:9.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Ibm
Ibm openpages With Watson |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2025-01-27T17:58:11.206Z
Reserved: 2024-06-09T13:59:02.606Z
Link: CVE-2024-37527

Updated: 2025-01-27T16:47:31.989Z

Status : Received
Published: 2025-01-27T16:15:30.840
Modified: 2025-01-27T16:15:30.840
Link: CVE-2024-37527

No data.