CVE-2025-66485

| EUVD-2025-209182 MEDIUM
2026-04-01 ibm
5.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

4
Analysis Generated
Apr 01, 2026 - 23:16 vuln.today
EUVD ID Assigned
Apr 01, 2026 - 23:16 euvd
EUVD-2025-209182
Patch Released
Apr 01, 2026 - 23:16 nvd
Patch available
CVE Published
Apr 01, 2026 - 23:01 nvd
MEDIUM 5.4

Description

IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers.  This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.

Analysis

HTTP header injection in IBM Aspera Shares 1.9.9 through 1.11.0 allows authenticated attackers to conduct cross-site scripting, cache poisoning, and session hijacking attacks via improper validation of HOST headers. The vulnerability requires authenticated access and carries a CVSS score of 5.4 with moderate confidentiality and integrity impact. No public exploit code or active exploitation has been confirmed.

Technical Context

IBM Aspera Shares is vulnerable to HTTP header injection due to insufficient input validation of HOST headers (CWE-644: Improper Validation of HTTP Request Header Fields). This class of vulnerability occurs when user-supplied data is included in HTTP response headers without proper sanitization, allowing attackers to inject arbitrary header values. The affected technology spans Aspera Shares versions 1.9.9 through 1.11.0. The vulnerability can be chained with browser-based attacks such as XSS when injected headers influence how user content is rendered, or exploited to manipulate cache behavior and session tokens through header manipulation.

Affected Products

IBM Aspera Shares versions 1.9.9 through 1.11.0 are affected. The CPE identifier cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:* covers all configurations of the affected version range. Organizations using any release within this window require remediation.

Remediation

Upgrade IBM Aspera Shares to version 1.11.1 or later, as patches are available from IBM per vendor advisory at https://www.ibm.com/support/pages/node/7267848. Immediately apply the security update to all deployed instances, prioritizing systems handling sensitive data or exposed to untrusted user populations. Review HTTP header handling in proxy and load balancer configurations to ensure no downstream systems are replicating unsanitized HOST headers. If immediate patching is not feasible, restrict access to Aspera Shares to trusted internal networks and audit authentication logs for suspicious header manipulation attempts.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +27
POC: 0

Share

CVE-2025-66485 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy