Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud

0
Medium
VulnerabilityCVE-2025-62346cvecve-2025-62346cwe-352
Published: Thu Nov 20 2025 (11/20/2025, 08:08:06 UTC)
Source: CVE Database V5
Vendor/Project: HCL Software
Product: Glovius Cloud

Description

A Cross-Site Request Forgery (CSRF) vulnerability was identified in HCL Glovius Cloud. An attacker can force a user's web browser to execute an unwanted, malicious action on a trusted site where the user is authenticated, specifically on one endpoint.

AI-Powered Analysis

AILast updated: 11/27/2025, 09:07:16 UTC

Technical Analysis

CVE-2025-62346 is a Cross-Site Request Forgery (CSRF) vulnerability identified in HCL Software's Glovius Cloud, a cloud-based product used for 3D CAD visualization and collaboration. The vulnerability exists in versions up to S05.25 and allows an attacker to coerce an authenticated user's browser into sending unauthorized commands to the Glovius Cloud server. This occurs because the affected endpoint lacks sufficient CSRF protections, such as anti-CSRF tokens or proper validation of request origins. The attacker must entice the user to visit a malicious website or click a crafted link, which then triggers the unwanted action on the trusted Glovius Cloud session. The CVSS 3.1 score of 6.8 reflects a medium severity, with the vector indicating the attack requires low privileges, user interaction, and is exploitable over an adjacent network (likely the user's local network or VPN). The impact is high across confidentiality, integrity, and availability, meaning sensitive data could be exposed or altered, and service disruption is possible. No public exploits are known at this time, but the vulnerability's presence in a cloud collaboration tool used in engineering and manufacturing workflows raises concerns about potential industrial espionage or sabotage. The lack of available patches at publication suggests organizations must rely on compensating controls until updates are released.

Potential Impact

For European organizations, the impact of this CSRF vulnerability in Glovius Cloud can be significant. Glovius Cloud is often used in engineering, manufacturing, and product design sectors, which are critical to European economies, especially in countries like Germany, France, and the UK. Exploitation could lead to unauthorized modification or deletion of sensitive CAD data, intellectual property theft, or disruption of collaborative workflows. This could result in financial losses, reputational damage, and potential regulatory compliance issues under GDPR if personal or sensitive data is involved. The requirement for user interaction and low privileges means that phishing or social engineering could facilitate attacks, increasing the risk surface. Additionally, since the vulnerability affects a cloud service, the scope of impact could extend beyond a single organization to partners and supply chain entities using the same platform.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately review and restrict user privileges in Glovius Cloud to the minimum necessary to reduce potential damage from CSRF attacks. 2) Educate users about phishing and social engineering risks to prevent inadvertent triggering of malicious requests. 3) Monitor and log user actions within Glovius Cloud for unusual or unauthorized activity that could indicate exploitation attempts. 4) Enforce strict session management policies, including short session timeouts and re-authentication for sensitive operations. 5) Where possible, apply web application firewalls (WAF) with custom rules to detect and block suspicious cross-site requests targeting the affected endpoints. 6) Coordinate with HCL Software to obtain and apply patches or updates as soon as they become available. 7) Consider network segmentation or VPN restrictions to limit access to Glovius Cloud to trusted environments. 8) Implement Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF attack vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
HCL
Date Reserved
2025-10-10T09:04:27.771Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ed086337afffbc004aae6

Added to database: 11/20/2025, 8:25:42 AM

Last enriched: 11/27/2025, 9:07:16 AM

Last updated: 1/7/2026, 8:54:27 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats