Cyber Posture

CVE-2024-41746

High

Published: 16 January 2025

Published
16 January 2025
Modified
14 August 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0021 43.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-41746 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Ibm Cics Tx. Its CVSS base score is 7.2 (High).

Operationally, ranked at the 43.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents stored XSS exploitation by requiring filtering and encoding of Web UI outputs containing user-supplied data to block JavaScript execution.

prevent

Prevents injection of malicious JavaScript into the Web UI by validating and sanitizing all information inputs before storage.

prevent

Mitigates the specific stored XSS flaw in IBM CICS TX by requiring timely flaw remediation through patching as per the IBM advisory.

NVD Description

IBM CICS TX Advanced 10.1, 11.1, and Standard 11.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a…

more

trusted session.

Deeper analysisAI

CVE-2024-41746 is a stored cross-site scripting vulnerability (CWE-79) in IBM CICS TX Advanced versions 10.1 and 11.1, as well as Standard 11.1. The issue affects the Web UI, enabling users to embed arbitrary JavaScript code that alters the intended functionality and can potentially lead to credentials disclosure within a trusted session. Published on 2025-01-16, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction or privileges required. Successful exploitation allows injection of malicious JavaScript into the Web UI, which executes in the context of trusted users' sessions, potentially enabling theft of credentials or other sensitive data.

IBM has issued a security advisory with details on the vulnerability and mitigation at https://www.ibm.com/support/pages/node/7171873.

Details

CWE(s)

Affected Products

ibm
cics tx
10.1, 11.1.0.0

CVEs Like This One

CVE-2024-41742Same product: Linux Linux Kernel
CVE-2024-43178Same product: Linux Linux Kernel
CVE-2024-51476Same product: Linux Linux Kernel
CVE-2025-13718Same product: Linux Linux Kernel
CVE-2025-13219Same product: Linux Linux Kernel
CVE-2024-41743Same product: Linux Linux Kernel
CVE-2024-45643Same product: Linux Linux Kernel
CVE-2025-13726Same product: Linux Linux Kernel
CVE-2025-33088Same product: Linux Linux Kernel
CVE-2025-36253Same product: Linux Linux Kernel

References