Impact
HCL Sametime contains a flaw where server‑side input validation is missing, allowing client‑side checks to be bypassed. An attacker can craft HTTP requests that reach the server unfiltered, leading to a boolean‑based SQL injection. This vulnerability may enable unauthorized execution of SQL commands, potentially exposing or altering sensitive data.
Affected Systems
The affected product is HCL Sametime. No specific version information is supplied in the CNA data. Administrators should review their deployment and consult the HCL support article referenced in the advisory to determine if they are impacted.
Risk and Exploitability
The CVSS score of 2.7 indicates low severity, and the EPSS score below 1% suggests a low probability of exploitation. Because the vulnerability is not listed in the CISA KEV catalog, no large‑scale compromises have been reported. However, the remote attacker can issue HTTP requests directly to the Sametime server to exploit the flaw. Patching remains the recommended action to eliminate this risk.
OpenCVE Enrichment