Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55273: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in HCL Aftermarket DPC

0
Medium
VulnerabilityCVE-2025-55273cvecve-2025-55273cwe-829
Published: Thu Mar 26 2026 (03/26/2026, 12:52:59 UTC)
Source: CVE Database V5
Vendor/Project: HCL
Product: Aftermarket DPC

Description

HCL Aftermarket DPC is affected by Cross Domain Script Include vulnerability where an attacker using external scripts can tamper with the DOM, altering the content or behavior of the application. Malicious scripts can steal cookies or session tokens, leading to session hijacking.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 13:32:30 UTC

Technical Analysis

CVE-2025-55273 affects HCL Aftermarket DPC version 1.0.0 and is categorized under CWE-829, which involves the inclusion of functionality from an untrusted control sphere. Specifically, this vulnerability manifests as a Cross Domain Script Include issue, where the application improperly incorporates external scripts from untrusted sources into its DOM. This flaw enables attackers to inject malicious scripts that can manipulate the DOM, altering the application's content or behavior. Such manipulation can facilitate theft of cookies or session tokens, leading to session hijacking attacks. The vulnerability requires no privileges (AV:N/PR:N) but does require user interaction (UI:R), such as clicking a crafted link or visiting a malicious page. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to its limited impact on confidentiality and availability, but notable impact on integrity. No patches or known exploits are currently available, indicating the need for proactive mitigation. The vulnerability's exploitation vector is network-based, making remote exploitation feasible if users interact with malicious content. The flaw highlights insufficient validation or sanitization of included scripts, allowing attackers to leverage external domains to inject harmful code into the application context.

Potential Impact

The primary impact of CVE-2025-55273 is on the integrity of the HCL Aftermarket DPC application, as attackers can alter DOM content and behavior. This can lead to session hijacking through theft of cookies or session tokens, potentially allowing unauthorized access to user sessions. Although confidentiality and availability impacts are minimal, compromised sessions can lead to unauthorized actions within the application, data manipulation, or privilege escalation depending on the user's role. Organizations relying on HCL Aftermarket DPC for critical business processes may face operational disruptions or data integrity issues. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering attacks could be effective. The absence of known exploits currently reduces immediate risk but also means organizations must be vigilant and implement mitigations promptly to prevent future exploitation. The vulnerability could be leveraged in supply chain attacks or combined with other vulnerabilities to increase overall impact.

Mitigation Recommendations

1. Apply patches or updates from HCL as soon as they become available to address the vulnerability directly. 2. Implement Content Security Policy (CSP) headers to restrict the domains from which scripts can be loaded, effectively blocking unauthorized external scripts. 3. Sanitize and validate all inputs and script sources rigorously to prevent inclusion of untrusted scripts. 4. Employ secure cookie attributes such as HttpOnly and Secure to reduce the risk of cookie theft via script access. 5. Educate users about the risks of interacting with untrusted links or content that could trigger malicious script execution. 6. Monitor application logs and network traffic for unusual script inclusion or DOM manipulation activities. 7. Use web application firewalls (WAFs) with rules designed to detect and block cross-domain script injection attempts. 8. Conduct regular security assessments and code reviews focusing on script inclusion and DOM manipulation mechanisms. These measures collectively reduce the attack surface and mitigate exploitation risk beyond generic advice.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HCL
Date Reserved
2025-08-12T07:00:17.741Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5319ff4197a8e3bc7dd49

Added to database: 3/26/2026, 1:16:15 PM

Last enriched: 3/26/2026, 1:32:30 PM

Last updated: 3/26/2026, 7:43:13 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses