{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4918","assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","state":"PUBLISHED","assignerShortName":"ibm","dateReserved":"2026-03-26T17:42:59.745Z","datePublished":"2026-04-22T23:26:38.626Z","dateUpdated":"2026-04-30T21:41:27.314Z"},"containers":{"cna":{"providerMetadata":{"orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm","dateUpdated":"2026-04-30T21:41:27.314Z"},"title":"IBM Guardium Data Protection is affected by multiple vulnerabilities","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"affected":[{"vendor":"IBM","product":"Guardium Data Protection","versions":[{"status":"affected","version":"12.1.0","lessThanOrEqual":"2.3.0","versionType":"semver"}],"cpes":["cpe:2.3:a:ibm:guardium_data_protection:12.1:*:*:*:*:*:*:*","cpe:2.3:a:ibm:guardium_data_protection:12.1.0:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"IBM Guardium Data Protection 12.1 is vulnerable to stored cross-site scripting. This vulnerability allows an administrative user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>IBM Guardium Data Protection 12.1 is vulnerable to stored cross-site scripting. This vulnerability allows an administrative user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.</p>"}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7270422","tags":["vendor-advisory","patch"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N"}}],"solutions":[{"lang":"en","value":"IBM encourages customers to update their systems promptly.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n ProductVersions FixIBM Guardium Data Protection12.1 https://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&product=ibm/Information+Management/InfoSphere+Guardium&release=12.1&platform=Linux&function=fixId&fixids=SqlGuard-12.0p140_Bundle&includeSupersedes=0&source=fc","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><div><p><strong>IBM encourages customers to update their systems promptly.</strong></p></div></div></div></div></div></div></div><div><div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div><table><tbody><tr><td><strong>&nbsp;Product</strong></td><td><strong>Versions</strong></td><td><strong>&nbsp;Fix</strong></td></tr><tr><td>IBM Guardium Data Protection</td><td>12.1</td><td><a href=\"https://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&amp;product=ibm/Information+Management/InfoSphere+Guardium&amp;release=12.1&amp;platform=Linux&amp;function=fixId&amp;fixids=SqlGuard-12.0p140_Bundle&amp;includeSupersedes=0&amp;source=fc\" rel=\"nofollow\">https://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&amp;product=ibm/Information+Management/InfoSphere+Guardium&amp;release=12.1&amp;platform=Linux&amp;function=fixId&amp;fixids=SqlGuard-12.0p140_Bundle&amp;includeSupersedes=0&amp;source=fc</a></td></tr></tbody></table></div></div></div><p></p>"}]}],"x_generator":{"engine":"ibm-cvegen"},"credits":[{"lang":"en","value":"benjamin.dixon.vaca8k@statefarm.com, benjamin.dixon.vaca8k@statefarm.com, benjamin.dixon.vaca8k@statefarm.com","type":"finder"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-23T12:50:49.171124Z","id":"CVE-2026-4918","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-23T12:50:59.052Z"}}]}}