Tuesday, April 22, 2025
HomeCVE/vulnerabilityIBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

Published on

SIEM as a Service

Follow Us on Google News

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular file exchange solution.

The flaw, designated as CVE-2025-3423, allows attackers to inject malicious JavaScript into the web interface, potentially compromising sensitive user data.

Vulnerability Details

The vulnerability is classified as a DOM-based Cross-Site Scripting (XSS) issue. It enables authenticated users to embed arbitrary JavaScript code within the application’s Web UI.

- Advertisement - Google News

Once executed, this code can alter the intended functionality of the platform, potentially leading to the disclosure of user credentials or other sensitive information during a trusted session.

The Common Weakness Enumeration (CWE) associated with this issue is CWE-79, which pertains to improper neutralization of input during web page generation.

IBM has rated the vulnerability with a CVSS base score of 5.4, indicating moderate severity. The attack vector is remote and requires user interaction, such as clicking on a malicious link crafted by an attacker.

AspectDetails
Vulnerability IDCVE-2025-3423
SeverityModerate (CVSS Base Score: 5.4)
Affected VersionsIBM Aspera Faspex 5.0.0 through 5.0.11
Remediation/FixUpgrade to version 5.0.12 on Linux platforms

Affected Versions

The flaw impacts IBM Aspera Faspex versions 5.0.0 through 5.0.11. Users running these versions are strongly advised to take immediate action to mitigate potential risks/

IBM has released an update to address this vulnerability. Users should upgrade to version 5.0.12 of IBM Aspera Faspex on Linux platforms to eliminate the risk posed by CVE-2025-3423. The patch can be downloaded from IBM’s official support page.

Unfortunately, no workarounds or mitigations are available for users unable to immediately apply the fix. This makes upgrading to the latest version critical for maintaining security.

Exploitation of this vulnerability could allow attackers to execute malicious scripts in a user’s browser session, leading to unauthorized access or theft of sensitive information such as login credentials.

While no public proof-of-concept exploit has been reported yet, the vulnerability’s remote exploitability heightens its potential risk.

IBM disclosed this vulnerability on April 11, 2025, through its security bulletin platform and has provided detailed remediation guidance. 

The issue underscores the importance of proactive vulnerability management in safeguarding enterprise systems.

By addressing this flaw promptly, organizations can minimize the risk of exploitation and maintain trust in their file exchange operations powered by IBM Aspera Faspex.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...