{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T04:09:02.534","vulnerabilities":[{"cve":{"id":"CVE-2025-36368","sourceIdentifier":"psirt@us.ibm.com","published":"2026-03-13T19:53:50.813","lastModified":"2026-03-20T14:49:15.210","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, and 6.2.1.0 through 6.2.1.1_1 are vulnerable to SQL injection. An administrative user could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database."},{"lang":"es","value":"IBM Sterling B2B Integrator e IBM Sterling File Gateway 6.1.0.0 hasta 6.1.2.7_2, 6.2.0.0 hasta 6.2.0.5_1, y 6.2.1.0 hasta 6.2.1.1_1 son vulnerables a inyección SQL. Un usuario administrativo podría enviar sentencias SQL especialmente diseñadas, lo que podría permitir al atacante ver, añadir, modificar o eliminar información en la base de datos de back-end."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.0.0","versionEndExcluding":"6.1.2.8","matchCriteriaId":"CF5BFBAA-B7B6-43FC-893D-F62E8AC28673"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0.0","versionEndExcluding":"6.2.0.5_2","matchCriteriaId":"0F026F01-EF66-4E43-A081-F1B2C7C87904"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.1.0","versionEndExcluding":"6.2.1.1_2","matchCriteriaId":"0D31014C-F7D8-4B69-AB89-2A6AEAB7B667"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.0.0","versionEndExcluding":"6.1.2.8","matchCriteriaId":"00C60634-AE0C-4641-B645-0D0511A0070C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0.0","versionEndExcluding":"6.2.0.5_2","matchCriteriaId":"98CB35E7-789A-44B3-86E3-6F2A0CE56D4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.1.0","versionEndExcluding":"6.2.1.1_2","matchCriteriaId":"4AD23AED-25F6-45AB-93DD-FC1864431290"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7263324","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}