EUVD-2025-209063

| CVE-2025-55270 LOW
2026-03-26 HCL GHSA-jhhm-rg4m-4qmm
3.5
CVSS 3.1

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 26, 2026 - 13:15 vuln.today
EUVD ID Assigned
Mar 26, 2026 - 13:15 euvd
EUVD-2025-209063
CVE Published
Mar 26, 2026 - 12:59 nvd
LOW 3.5

Description

HCL Aftermarket DPC is affected by Improper Input Validation which allows an attacker to inject executable code and can carry out attacks such as XSS, SQL Injection, Command Injection etc.

Analysis

HCL Aftermarket DPC version 1.0.0 contains improper input validation (CWE-20) that enables multiple injection attack vectors including Cross-Site Scripting (XSS), SQL Injection, and Command Injection. Authenticated attackers can exploit this vulnerability to inject and execute arbitrary code within the application context. No public exploit code or active exploitation has been identified at time of analysis, and the moderate CVSS score of 3.5 reflects limited confidentiality impact with user interaction required.

Technical Context

The vulnerability resides in HCL Aftermarket DPC (CPE: cpe:2.3:a:hcl:aftermarket_dpc:*:*:*:*:*:*:*:*), an aftermarket product management system. The root cause is classified as CWE-20 (Improper Input Validation), which indicates insufficient sanitization and validation of user-supplied input before processing. This failure permits multiple injection attack classes (XSS, SQL Injection, Command Injection) to succeed depending on how unsanitized input flows through different code paths-whether reflected in HTML responses, embedded in database queries, or passed to system commands. The vulnerability affects version 1.0.0 of the product and likely versions prior to any patched release.

Affected Products

HCL Aftermarket DPC version 1.0.0 is confirmed affected per the ENISA European Vulnerability Database entry (EUVD-2025-209063). The affected product is identified via CPE string cpe:2.3:a:hcl:aftermarket_dpc:*:*:*:*:*:*:*:*. Refer to the HCL support advisory at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793 and the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-55270 for definitive version scope and patch availability confirmation.

Remediation

Consult the HCL support article (https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793) for vendor-released patch availability and exact fix version number. Once a patched release is confirmed, upgrade HCL Aftermarket DPC to the latest available version. As interim mitigations pending patching, enforce strict input validation and output encoding at the application layer; restrict network access to Aftermarket DPC to authenticated internal users only; implement a Web Application Firewall (WAF) configured to block common XSS and SQL injection payloads; apply the principle of least privilege to database and system command execution contexts; and enable comprehensive audit logging of user inputs and code execution events.

Priority Score

18
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +18
POC: 0

Share

EUVD-2025-209063 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy