CVE-2025-33014
📊 5.4 MEDIUM⚡ 0.0%🎯 0 exploits
📅 Published Jul 18, 2025
📋 Status: Analyzed
IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.
CVSS v3.1 • [email protected]
🎯 Affected Products & Systems
7 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | ibm | sterling b2b integrator | ≥ 6.0.0.0 ∧ < 6.1.2.7_1 | Vulnerable | cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:* |
📱App | ibm | sterling b2b integrator | ≥ 6.2 ∧ < 6.2.0.5 | Vulnerable | cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:* |
📱App | ibm | sterling file gateway | ≥ 6.0.0.0 ∧ < 6.1.2.7_1 | Vulnerable | cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:* |
📱App | ibm | sterling file gateway | ≥ 6.2.0.0 ∧ < 6.2.0.5 | Vulnerable | cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:* |
💻OS | ibm | aix | All versions | Not Vulnerable | cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:* |
💻OS | linux | linux kernel | All versions | Not Vulnerable | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
💻OS | microsoft | windows | All versions | Not Vulnerable | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: ≥ 6.0.0.0 ∧ < 6.1.2.7_1
CPE:
cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*
📱
VulnerableApplication
Version: ≥ 6.2 ∧ < 6.2.0.5
CPE:
cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*
📱
VulnerableApplication
Version: ≥ 6.0.0.0 ∧ < 6.1.2.7_1
CPE:
cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*
📱
VulnerableApplication
Version: ≥ 6.2.0.0 ∧ < 6.2.0.5
CPE:
cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*
💻
SafeOperating System
Version: All versions
CPE:
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
7 products•scroll for more
Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
LOW
User Interaction:
REQUIRED
Confidentiality:
LOW
Integrity:
LOW
Availability:
NONE
Scope:
CHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
5.4 (MEDIUM)v3.1
Source: [email protected]
EPSS Details
0.0% (Minimal)12.0th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Jul 18, 2025 (3 months ago)
Last Modified
Aug 2, 2025 (3 months ago)
Security Weaknesses1
CWE-1022
References2
NVDgeneral