PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-5902 IBM CVE debrief

CVE-2016-5902 is a cross-site scripting flaw in IBM Maximo Asset Management and related Maximo offerings. The issue allows arbitrary JavaScript to be embedded in the web UI, which can alter application behavior and may expose credentials or other session data within a trusted browser session. NVD rates the issue as medium severity, with network-based attack conditions but requiring user interaction.

Vendor
IBM
Product
CVE-2016-5902
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-08
Original CVE updated
2026-05-13
Advisory published
2017-02-08
Advisory updated
2026-05-13

Who should care

Administrators and security teams running IBM Maximo Asset Management 7.1, 7.5, or 7.6, as well as the listed Maximo industry solutions (aviation, energy optimization, government, life sciences, nuclear power, oil and gas, transportation, and utilities). Help desk and application owners should also care because successful exploitation depends on a user viewing attacker-controlled content in the web UI.

Technical summary

NVD maps the weakness to CWE-79 and assigns CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. That means the flaw is reachable over the network, does not require privileges, but does require user interaction. The security impact is limited but meaningful: injected script can run in the context of the application session, changing displayed content or actions and potentially disclosing credentials or other sensitive data. The affected CPEs in the NVD record include IBM Maximo Asset Management and several Maximo-branded industry products across the 7.1, 7.5, and 7.6 releases.

Defensive priority

Medium. This is not marked as an active known-exploited vulnerability in the supplied data, but it is security-relevant because it can undermine trusted sessions and user actions in a business application used for asset and operations management.

Recommended defensive actions

  • Review IBM's vendor advisory for the supported fix or remediation guidance.
  • Apply the vendor patch or update referenced by IBM as soon as practical.
  • Treat affected Maximo web pages and fields as potential XSS injection points during validation and testing.
  • Reduce exposure by limiting access to the Maximo UI to trusted users and networks where feasible.
  • Use defense-in-depth browser and application controls such as output encoding, input validation, and session protection mechanisms.
  • Monitor for unusual UI behavior, unexpected script execution, or suspicious credential activity in Maximo sessions.

Evidence notes

The description and weakness classification come from the supplied NVD record: arbitrary JavaScript can be embedded in the Web UI, with CWE-79 listed and CVSS vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The NVD record lists IBM advisory reference swg21988252 and a SecurityFocus VDB entry. The supplied data does not include exploit details, proof-of-concept code, or confirmation of active exploitation.

Official resources

The CVE was published on 2017-02-08. The 2026-05-13 modification timestamp in the supplied data reflects a later record update, not the original issue disclosure date.