CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
Lifecycle Timeline
3Tags
Description
HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database.
Analysis
SQL injection in HCL Aftermarket DPC version 1.0.0 enables unauthenticated remote attackers to extract sensitive database contents and potentially compromise data integrity and availability. The vulnerability carries a CVSS score of 8.3 with network-based attack vector requiring user interaction. No public exploit is identified at time of analysis, and SSVC assessment indicates no current exploitation with non-automatable attack characteristics.
Technical Context
HCL Aftermarket DPC version 1.0.0 (cpe:2.3:a:hcl:aftermarket_dpc:*:*:*:*:*:*:*:*) contains a SQL injection vulnerability allowing database manipulation through unsanitized user input. Interestingly, the CVE description maps to CWE-798 (Use of Hard-coded Credentials) rather than the expected CWE-89 (SQL Injection), suggesting the attack vector may involve exploiting static credentials to facilitate SQL injection attacks. The discrepancy between the described SQL injection and the assigned CWE-798 indicates this may be a compound vulnerability where hard-coded credentials enable subsequent SQL injection exploitation. The product appears to be a dealer parts commerce platform handling aftermarket automotive or industrial parts inventory and transaction data.
Affected Products
HCL Aftermarket DPC version 1.0.0 is confirmed affected according to EUVD-2025-209081 data. The CPE string cpe:2.3:a:hcl:aftermarket_dpc:*:*:*:*:*:*:*:* indicates the HCL vendor's aftermarket dealer parts commerce platform. The vendor has published advisory details at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793 with additional reference tracking through the National Vulnerability Database at https://nvd.nist.gov/vuln/detail/CVE-2025-55262. Organizations running HCL Aftermarket DPC 1.0.0 should consider themselves affected and consult the vendor advisory immediately.
Remediation
Consult the HCL vendor security advisory at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793 for official patch guidance and upgrade instructions. While specific patched version numbers are not confirmed in available intelligence, the vendor advisory should provide remediation steps and updated software releases. Until patching is completed, implement defense-in-depth controls including restricting network access to the DPC platform to trusted IP ranges only, deploying web application firewall rules to detect and block SQL injection attempts, enforcing parameterized queries and input validation at the application layer if source code access permits, and monitoring database query logs for suspicious activity. Given the CWE-798 classification suggesting hard-coded credentials, also review and rotate any static authentication credentials used by the application.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209081
GHSA-2g37-4q7v-m5xx