{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-0835","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2026-01-09T23:27:35.566Z","datePublished":"2026-03-13T18:57:35.435Z","dateUpdated":"2026-03-13T19:36:39.022Z"},"containers":{"cna":{"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2026-03-13T19:01:09.073Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"CWE-79 Improper neutralization of input during web page generation ('cross-site scripting')","type":"CWE"}]}],"affected":[{"versions":[{"status":"affected","version":"6.1.0.0","lessThanOrEqual":"6.1.2.7_2","versionType":"semver"},{"status":"affected","version":"6.2.0.0","lessThanOrEqual":"6.2.0.5_1","versionType":"semver"},{"status":"affected","version":"6.2.1.0","lessThanOrEqual":"6.2.1.1_1","versionType":"semver"},{"status":"affected","version":"6.2.2.0","versionType":"semver"}],"defaultStatus":"unaffected","cpes":["cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*","cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.7_2:*:*:*:standard:*:*:*","cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:standard:*:*:*","cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.5_1:*:*:*:standard:*:*:*","cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.1.0:*:*:*:standard:*:*:*","cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.1.1_1:*:*:*:standard:*:*:*","cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.2.0:*:*:*:standard:*:*:*"],"vendor":"IBM","product":"Sterling B2B Integrator"}],"descriptions":[{"lang":"en","value":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 are vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","supportingMedia":[{"type":"text/html","base64":false,"value":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through&nbsp;6.1.2.7_2,&nbsp;6.2.0.0 through&nbsp;6.2.0.5_1, 6.2.1.0 through&nbsp;6.2.1.1_1, and 6.2.2.0 are vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7263326","tags":["vendor-advisory","patch"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.0"},"solutions":[{"lang":"en","value":"ProductVersionAPARRemediation & FixIBM Sterling B2B Integrator and IBM Sterling File Gateway6.1.0.0 - 6.1.2.7_2IT48958  Apply B2Bi 6.1.2.8, 6.2.0.5_2, 6.2.1.1_2 or 6.2.2.0_1IBM Sterling B2B Integrator and IBM Sterling File Gateway6.2.0.0 - 6.2.0.5_1IT48958  Apply B2Bi 6.2.0.5_2, 6.2.1.1_2 or 6.2.2.0_1IBM Sterling B2B Integrator and IBM Sterling File Gateway6.2.1.0 - 6.2.1.1_1IT48958  Apply B2Bi 6.2.1.1_2 or 6.2.2.0_1IBM Sterling B2B Integrator and IBM Sterling File Gateway6.2.2.0IT48958 Apply B2Bi 6.2.2.0_1The IIM versions of 6.1.2.8, 6.2.0.5_2, 6.2.1.1_2 and 6.2.2.0_1 are available on  Fix Central http://www-933.ibm.com/support/fixcentral/swg/selectFixes . \n\nThe container version of 6.1.2.8, 6.2.0.5_2, 6.2.1.1_2 and 6.2.2.0_1 are available in IBM Entitled Registry.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table><tbody><tr><td>Product</td><td>Version</td><td>APAR</td><td>Remediation &amp; Fix</td></tr><tr><td>IBM Sterling B2B Integrator and IBM Sterling File Gateway</td><td>6.1.0.0 - 6.1.2.7_2</td><td>IT48958 &nbsp;</td><td>Apply B2Bi 6.1.2.8, 6.2.0.5_2, 6.2.1.1_2 or 6.2.2.0_1</td></tr><tr><td>IBM Sterling B2B Integrator and IBM Sterling File Gateway</td><td>6.2.0.0 - 6.2.0.5_1</td><td>IT48958 &nbsp;</td><td>Apply B2Bi 6.2.0.5_2, 6.2.1.1_2 or 6.2.2.0_1</td></tr><tr><td>IBM Sterling B2B Integrator and IBM Sterling File Gateway</td><td>6.2.1.0 - 6.2.1.1_1</td><td>IT48958 &nbsp;</td><td>Apply B2Bi 6.2.1.1_2 or 6.2.2.0_1</td></tr><tr><td>IBM Sterling B2B Integrator and IBM Sterling File Gateway</td><td>6.2.2.0</td><td>IT48958&nbsp;</td><td>Apply B2Bi 6.2.2.0_1</td></tr></tbody></table><div><p>The IIM versions of 6.1.2.8, 6.2.0.5_2, 6.2.1.1_2 and 6.2.2.0_1 are available on&nbsp;<a href=\"http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~Other%2Bsoftware&amp;product=ibm/Other+software/Sterling+B2B+Integrator&amp;release=All&amp;platform=All&amp;function=all\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Fix Central</a>.&nbsp;</p><p>The container version of 6.1.2.8, 6.2.0.5_2, 6.2.1.1_2 and 6.2.2.0_1 are available in IBM Entitled Registry.</p></div>"}]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-13T19:36:29.900119Z","id":"CVE-2026-0835","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-13T19:36:39.022Z"}}]}}