VYPR
Medium severity6.1NVD Advisory· Published Feb 17, 2026· Updated Apr 15, 2026

CVE-2025-33135

CVE-2025-33135

Description

IBM Financial Transaction Manager for ACH Services and Check Services for Multi-Platform 3.0.0.0 through 3.0.5.4 Interim Fix 027 IBM Financial Transaction Manager for Check Services v3 (Multiplatforms) is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

IBM Financial Transaction Manager for ACH and Check Services (Multi-Platform) 3.0.0.0–3.0.5.4 IF027 is vulnerable to stored XSS allowing unauthenticated credential disclosure.

Vulnerability

Overview

IBM Financial Transaction Manager (FTM) for ACH Services and Check Services for Multi-Platform versions 3.0.0.0 through 3.0.5.4 Interim Fix 027 contain a cross-site scripting (XSS) vulnerability in the Web UI. This flaw stems from improper neutralization of user-controlled input during web page generation, enabling an attacker to inject arbitrary JavaScript code into the application's interface. The root cause is insufficient input validation or encoding of untrusted data before rendering it to users.

Attack

Surface and Prerequisites

An unauthenticated remote attacker can exploit this vulnerability without needing prior access to the system. The attack vector is network-based and requires no special privileges or user interaction beyond a victim visiting a crafted link or page within the affected Web UI. The vulnerability likely exists in a component where user-supplied data is reflected or stored and later displayed without sanitization, such as in error messages, transaction details, or configuration pages.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session within the trusted FTM domain. This can lead to credential disclosure, session hijacking, or unauthorized actions performed on behalf of the victim. The CVSS v3 base score of 6.1 (Medium) reflects the potential for confidentiality impact on confidentiality and integrity but with low attack complexity and no authentication requirements [1].

Mitigation

Status

IBM has published a security advisory (reference [1]) that includes instructions for applying Interim Fix 027 or later versions to remediate this issue. Users are advised to upgrade to a patched release as soon as possible. No workarounds are mentioned, and there is no indication that this CVE is listed in the CISA Known Exploited Vulnerabilities (KEV) catalog at the time of writing.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.