Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud

0
Medium
VulnerabilityCVE-2025-62346cvecve-2025-62346cwe-352
Published: Thu Nov 20 2025 (11/20/2025, 08:08:06 UTC)
Source: CVE Database V5
Vendor/Project: HCL Software
Product: Glovius Cloud

Description

A Cross-Site Request Forgery (CSRF) vulnerability was identified in HCL Glovius Cloud. An attacker can force a user's web browser to execute an unwanted, malicious action on a trusted site where the user is authenticated, specifically on one endpoint.

AI-Powered Analysis

AILast updated: 11/20/2025, 08:36:28 UTC

Technical Analysis

CVE-2025-62346 is a Cross-Site Request Forgery (CSRF) vulnerability identified in HCL Software's Glovius Cloud product, specifically affecting versions up to S05.25. CSRF vulnerabilities occur when an attacker tricks an authenticated user’s browser into submitting a malicious request to a web application without the user's consent or knowledge. In this case, the attacker can induce the victim's browser to perform unauthorized actions on the Glovius Cloud platform, leveraging the victim’s authenticated session. The vulnerability affects a single endpoint, which could potentially allow unauthorized changes or data manipulation. The CVSS 3.1 score of 6.8 reflects a medium severity, with the vector indicating the attack requires adjacent network access (AV:A), high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to significant data compromise or service disruption. No public exploits are known at this time, and no patches have been linked yet, suggesting the vulnerability is newly disclosed. The vulnerability is categorized under CWE-352, which is a common web security weakness related to insufficient anti-CSRF protections. The technical details confirm the vulnerability was reserved in early October 2025 and published in November 2025. Given the nature of Glovius Cloud as a cloud-based product used for 3D CAD visualization and collaboration, the vulnerability could impact sensitive intellectual property and collaborative workflows if exploited.

Potential Impact

For European organizations, the impact of this CSRF vulnerability in Glovius Cloud could be significant, especially for industries relying on CAD visualization and collaboration such as automotive, aerospace, manufacturing, and engineering sectors. Unauthorized actions executed through CSRF could lead to data leakage, unauthorized modifications, or disruption of collaborative processes, potentially affecting intellectual property confidentiality and operational integrity. Since Glovius Cloud is a cloud service, exploitation could also affect availability, causing downtime or degraded service impacting productivity. The requirement for user interaction and low privilege means that targeted phishing or social engineering campaigns could facilitate exploitation. Organizations with remote or hybrid workforces using Glovius Cloud are particularly at risk due to increased exposure to web-based threats. The absence of known exploits provides a window for proactive mitigation, but the medium severity and high impact on core security properties necessitate urgent attention to prevent potential damage.

Mitigation Recommendations

1. Monitor HCL Software advisories closely for official patches addressing CVE-2025-62346 and apply them promptly once available. 2. Implement robust anti-CSRF tokens on all state-changing endpoints within Glovius Cloud or any custom integrations to ensure requests are validated as legitimate. 3. Enforce strict SameSite cookie attributes (preferably 'Strict' or 'Lax') to reduce the risk of cookies being sent in cross-site requests. 4. Educate users on phishing and social engineering risks to minimize the likelihood of user interaction leading to exploitation. 5. Use web application firewalls (WAFs) with rules designed to detect and block suspicious cross-site request patterns targeting Glovius Cloud endpoints. 6. Review and limit user privileges within Glovius Cloud to the minimum necessary to reduce potential damage from compromised accounts. 7. Conduct regular security assessments and penetration testing focusing on web session management and CSRF protections. 8. For organizations with custom integrations or APIs interacting with Glovius Cloud, ensure these interfaces also implement CSRF protections and secure authentication mechanisms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
HCL
Date Reserved
2025-10-10T09:04:27.771Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ed086337afffbc004aae6

Added to database: 11/20/2025, 8:25:42 AM

Last enriched: 11/20/2025, 8:36:28 AM

Last updated: 11/20/2025, 11:59:09 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats