CVE-2025-36054
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
06/11/2025
Last modified:
12/12/2025
Description
IBM Business Automation Workflow containers 24.0.0 through 24.0.0-IF006, 24.0.1 through 24.0.1-IF004, 25.0.0 through 25.0.0-IF001 and IBM Business Automation Workflow traditional with Process Federation Server 24.0.0 through 24.0.1 and 25.0.0 are vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ibm:business_automation_workflow:-:*:*:*:traditional:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:-:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if001:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if002:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if003:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if004:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if005:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.0:if006:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.1:-:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if001:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if002:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:24.0.1:if004:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:25.0.0:-:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:business_automation_workflow:25.0.0:if001:*:*:containers:*:*:* | ||
| cpe:2.3:a:ibm:process_federation_server:24.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



