{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T23:25:02.495","vulnerabilities":[{"cve":{"id":"CVE-2025-14289","sourceIdentifier":"psirt@us.ibm.com","published":"2026-02-17T21:22:14.067","lastModified":"2026-02-20T21:03:53.983","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM webMethods Integration Server 12.0 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site."},{"lang":"es","value":"IBM webMethods Integration Server 12.0 es vulnerable a la inyección HTML. Un atacante remoto podría inyectar código HTML malicioso que, al ser visto, se ejecutaría en el navegador web de la víctima dentro del contexto de seguridad del sitio de alojamiento."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Primary","description":[{"lang":"en","value":"CWE-80"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:webmethods_integration_server:12.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C3F337D6-B356-426F-AA8E-8C9F11D3259A"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7260932","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}