Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52654: CWE-80 in HCL HCL MyXalytics

0
Medium
VulnerabilityCVE-2025-52654cvecve-2025-52654cwe-80
Published: Fri Oct 03 2025 (10/03/2025, 18:11:20 UTC)
Source: CVE Database V5
Vendor/Project: HCL
Product: HCL MyXalytics

Description

A vulnerability in HCL HCL MyXalytics allows HTML InjectionThis issue affects HCL MyXalytics: 6.6.

AI-Powered Analysis

AILast updated: 10/03/2025, 18:32:05 UTC

Technical Analysis

CVE-2025-52654 is a medium-severity vulnerability identified in HCL MyXalytics version 6.6. The vulnerability is classified under CWE-80, which corresponds to Cross-Site Scripting (XSS) or HTML Injection issues. Specifically, this vulnerability allows an attacker to inject arbitrary HTML content into the application. The CVSS v3.1 base score is 4.6, reflecting a medium impact level. The vector string (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N) indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires the attacker to have some privileges (PR:L) and user interaction (UI:R). The scope remains unchanged (S:U), and the impact affects confidentiality and integrity to a limited extent (C:L/I:L) but does not affect availability (A:N). The vulnerability arises from improper sanitization or validation of user-supplied input that is rendered as HTML content, enabling an attacker to inject malicious scripts or HTML elements. This can lead to unauthorized disclosure of information, session hijacking, or manipulation of displayed content, potentially misleading users or compromising data integrity. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved in June 2025 and published in October 2025, indicating recent discovery and disclosure. Given the nature of MyXalytics as an analytics platform, the injection could be leveraged to target users interacting with dashboards or reports, potentially impacting business intelligence data confidentiality and trustworthiness.

Potential Impact

For European organizations using HCL MyXalytics 6.6, this vulnerability poses a risk to the confidentiality and integrity of analytics data and user sessions. Attackers exploiting this HTML Injection could execute malicious scripts in the context of legitimate users, potentially stealing sensitive information such as authentication tokens or business intelligence data. This could lead to unauthorized data access or manipulation, undermining decision-making processes. Although availability is not directly impacted, the reputational damage from data integrity issues or information leakage could be significant. Sectors relying heavily on analytics for operational or strategic decisions, such as finance, manufacturing, and government agencies, may face increased risk. Additionally, compliance with GDPR and other data protection regulations could be jeopardized if personal or sensitive data is exposed or manipulated through this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on all user-supplied data rendered in HCL MyXalytics interfaces. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Limit user privileges to the minimum necessary to reduce the impact of potential exploitation, as the vulnerability requires low privileges but not full administrative access. Monitor user interactions and logs for unusual activities that may indicate attempted exploitation. Since no official patch is currently available, consider applying temporary workarounds such as disabling or restricting features that accept user-generated content or HTML input. Engage with HCL support to obtain updates on patch availability and apply them promptly once released. Additionally, conduct security awareness training for users to recognize and avoid interacting with suspicious content that could trigger exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HCL
Date Reserved
2025-06-18T14:03:06.891Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e014ac1485ec6038e2a7e2

Added to database: 10/3/2025, 6:23:40 PM

Last enriched: 10/3/2025, 6:32:05 PM

Last updated: 10/7/2025, 12:00:55 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats