Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62328: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in HCLSoftware Nomad server on Domino

0
Low
VulnerabilityCVE-2025-62328cvecve-2025-62328cwe-1021
Published: Wed Mar 11 2026 (03/11/2026, 22:04:11 UTC)
Source: CVE Database V5
Vendor/Project: HCLSoftware
Product: Nomad server on Domino

Description

HCL Nomad server on Domino did not configure the frame-ancestors directive in the Content-Security-Policy header by default which could allow an attacker to obtain sensitive information via unspecified vectors.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:14:52 UTC

Technical Analysis

CVE-2025-62328 identifies a security weakness in HCL Nomad server on Domino versions earlier than 1.0.19, where the Content-Security-Policy (CSP) header lacks the frame-ancestors directive by default. The frame-ancestors directive is a critical CSP control that restricts which origins are permitted to embed the web application within frames or iframes. Without this restriction, attackers can perform clickjacking or UI redressing attacks by embedding the vulnerable application inside a malicious frame hosted on an attacker-controlled domain. Although the exact exploitation vectors are unspecified, the vulnerability could lead to unauthorized disclosure of sensitive information if an attacker tricks users into interacting with the framed content or leverages browser behaviors to extract data. The CVSS v3.1 score of 3.7 reflects a network attack vector with high attack complexity, no privileges or user interaction required, and limited confidentiality impact without affecting integrity or availability. The vulnerability is classified under CWE-1021, which concerns improper restriction of rendered UI layers or frames. No patches are currently linked, but the vendor has reserved the CVE and published the advisory. The vulnerability is relevant to organizations using HCL Nomad server on Domino, a platform for accessing Domino applications remotely, often in enterprise environments.

Potential Impact

The primary impact of this vulnerability is a potential confidentiality breach through UI embedding attacks such as clickjacking or frame-based information leakage. Attackers could exploit this to trick users into revealing sensitive information or perform unauthorized actions by overlaying malicious content. However, the lack of integrity or availability impact and the high attack complexity reduce the overall risk. Organizations with sensitive data accessible via HCL Nomad server on Domino could face targeted attacks aiming to harvest credentials or confidential information. The vulnerability could also facilitate social engineering attacks by framing legitimate content within attacker-controlled pages. While no exploits are known in the wild, the exposure of this weakness increases the attack surface and could be leveraged in multi-stage attacks. Enterprises relying on this software for remote access to Domino applications should consider the risk in their threat models, especially where users access the service from untrusted networks or browsers.

Mitigation Recommendations

Organizations should upgrade HCL Nomad server on Domino to version 1.0.19 or later once the vendor releases a patch that properly configures the frame-ancestors directive in the CSP header. Until then, administrators can manually configure web server or reverse proxy settings to include a strict Content-Security-Policy header with frame-ancestors directives limiting framing to trusted domains only. For example, setting 'Content-Security-Policy: frame-ancestors 'self'' restricts framing to the same origin. Additionally, implementing X-Frame-Options headers as a fallback can help mitigate framing risks in older browsers. Security teams should audit their web application security headers regularly and conduct penetration testing to verify the effectiveness of these controls. User education about phishing and clickjacking risks can reduce the likelihood of successful exploitation. Monitoring web traffic for suspicious framing attempts and employing browser security features like frame busting scripts may provide additional layers of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HCL
Date Reserved
2025-10-10T09:04:23.570Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b2ff142f860ef943d3c34e

Added to database: 3/12/2026, 5:59:48 PM

Last enriched: 3/12/2026, 6:14:52 PM

Last updated: 3/13/2026, 9:53:31 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses