CVE-2025-55274

| EUVD-2025-209072 LOW
2026-03-26 HCL
2.6
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 26, 2026 - 13:15 vuln.today
EUVD ID Assigned
Mar 26, 2026 - 13:15 euvd
EUVD-2025-209072
CVE Published
Mar 26, 2026 - 12:47 nvd
LOW 2.6

Description

HCL Aftermarket DPC is affected by Cross-Origin Resource Sharing vulnerability. CORS misconfigurations includes the exposure of sensitive user information to attackers, unauthorized access to APIs, and possible data manipulation or leakage. If an attacker to exploit CORS misconfiguration, they could steal sensitive data, perform actions on behalf of a legitimate user.

Analysis

HCL Aftermarket DPC version 1.0.0 contains a Cross-Origin Resource Sharing (CORS) misconfiguration that permits authenticated attackers with low privileges to access sensitive user information and potentially perform unauthorized actions on behalf of legitimate users through browser-based attacks. The vulnerability requires user interaction (such as social engineering to visit a malicious webpage) and operates within a single security context, limiting its scope to confidentiality impact with no integrity or availability consequences. No public exploit code has been identified at the time of analysis, and the low CVSS score of 2.6 reflects the high attack complexity and limited practical exploitability despite the theoretical risk of data exposure.

Technical Context

The vulnerability stems from inadequate CORS policy configuration in HCL Aftermarket DPC, classified under CWE-942 (Permissive Cross-domain Policy with Untrusted Domains). CORS is a browser security mechanism that controls which cross-origin requests JavaScript code can make to backend APIs. When misconfigured, CORS policies may allow malicious websites to make authenticated requests to the vulnerable application on behalf of a logged-in user, potentially reading sensitive responses or performing state-changing operations. The affected product, identified via CPE cpe:2.3:a:hcl:aftermarket_dpc:*:*:*:*:*:*:*:*, operates as a web application where this misconfiguration exposes API endpoints to unauthorized cross-origin access. The root cause involves either overly permissive Access-Control-Allow-Origin headers, improper wildcard usage, or failure to validate origin headers before responding with sensitive data.

Affected Products

HCL Aftermarket DPC version 1.0.0 is confirmed as affected per the EUVD intelligence (EUVD-2025-209072). The CPE identifier cpe:2.3:a:hcl:aftermarket_dpc:*:*:*:*:*:*:*:* indicates the product family, though specific version boundaries beyond 1.0.0 are not explicitly stated in the available data. HCL has published a security advisory with additional details at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793, and vulnerability information is indexed in the NIST NVD at https://nvd.nist.gov/vuln/detail/CVE-2025-55274.

Remediation

Upgrade HCL Aftermarket DPC to a patched version as indicated in the vendor advisory (https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793); consult HCL support for the exact fixed version if not explicitly stated in the advisory. As an interim workaround pending patch deployment, restrict CORS policies by removing wildcard origins and explicitly whitelist only trusted domains that legitimately require cross-origin API access; audit and tighten Access-Control-Allow-Origin headers to specific, validated origins; implement SameSite cookie attributes (SameSite=Strict or SameSite=Lax) to mitigate credential exposure in cross-site requests; and consider network-level controls such as WAF rules to detect and block suspicious cross-origin requests. Additionally, educate users to avoid clicking links from untrusted sources, as the attack relies on user interaction.

Priority Score

13
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +13
POC: 0

Share

CVE-2025-55274 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy