PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8922 IBM CVE debrief

CVE-2016-8922 is a cross-site scripting (XSS) issue recorded by NVD and mapped to IBM web products, with the record identifying IBM Web Content Manager Production Analytics 4.0 and IBM WebSphere Portal 8.0/8.5 as affected CPEs. The CVSS v3.0 vector shows network reachability but requires user interaction, and the impact is limited to low confidentiality and integrity consequences. The supplied description indicates that arbitrary JavaScript could be embedded in the web UI, potentially leading to credential disclosure within a trusted session.

Vendor
IBM
Product
CVE-2016-8922
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-01
Original CVE updated
2026-05-13
Advisory published
2017-02-01
Advisory updated
2026-05-13

Who should care

IBM administrators and security teams responsible for Web Content Manager Production Analytics 4.0 and WebSphere Portal 8.0/8.5, especially environments that expose authenticated web UIs to end users or administrators.

Technical summary

The NVD record classifies the weakness as CWE-79 (cross-site scripting). The CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, which means the issue is reachable over the network, does not require privileges, but does require a victim to interact with crafted content. The security impact is consistent with script injection in a trusted browser session, which can expose session-bound data or alter UI behavior.

Defensive priority

Medium. The vulnerability is externally reachable and can affect trusted web sessions, but exploitation depends on user interaction and the recorded impact is limited rather than system-wide.

Recommended defensive actions

  • Review the IBM PSIRT advisory referenced in the NVD record and apply any vendor-provided remediation or updates for the affected product lines.
  • Validate whether IBM Web Content Manager Production Analytics 4.0 or WebSphere Portal 8.0/8.5 are deployed in your environment and prioritize those instances for remediation.
  • Audit web UI paths that accept or render user-controlled content for XSS exposure, and ensure input handling and output encoding are enforced where applicable.
  • Restrict access to administrative or high-trust web interfaces to reduce exposure while remediation is underway.
  • If suspicious script injection or session abuse is suspected, review logs, invalidate affected sessions, and reset potentially exposed credentials.

Evidence notes

The debrief is based on the supplied CVE record, NVD metadata, and the IBM vendor advisory reference embedded in the record. NVD lists CWE-79 and the CVSS v3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, and maps affected IBM CPEs. The supplied description states that arbitrary JavaScript in the web UI could affect functionality and expose credentials within a trusted session.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-02-01; the NVD record was later modified on 2026-05-13.