Description
HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database.
Published: 2026-03-26
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

A recent SQL Injection flaw in HCL Aftermarket DPC permits unauthenticated or compromised users to embed malicious SQL statements into user supplied data. By exploiting the vulnerable input routine, an attacker can read arbitrary rows from the underlying database, potentially exposing customer records, product inventory, and other confidential information. The weakness corresponds to CWE-89: Improper Neutralization of Special Elements used in an SQL Statement. Additionally, the product's use of hard‑coded credentials (CWE-798) further lowers the barrier of entry once the injection is successful.

Affected Systems

The affected product is HCL Aftermarket DPC, version 1.0.0, as identified by the vendor and reflected in the CPE string cpe:2.3:a:hcltech:aftermarket_cloud:1.0.0. No additional versions are listed, so only this release is known to be vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 8.3, indicating a high severity level. Exploit probability data from EPSS is not available, and the flaw is not currently listed in the CISA Known Exploited Vulnerabilities catalog. Because the description points to a SQL Injection, the most likely attack vector involves submitting crafted payloads through the application's web interface or API. Once the injection succeeds, an attacker could bypass normal authorization checks and gain full read access to the database. The impact spans confidentiality loss of sensitive data, and potential further exploitation if privileged credentials are also compromised.

Generated by OpenCVE AI on March 26, 2026 at 21:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether HCL has released a patch or update for Aftermarket DPC 1.0.0 and apply it immediately.
  • If a vendor patch is unavailable, limit network access to the application by allowing only trusted IP ranges and blocking external exposure.
  • Implement strict input validation and parameterized queries to eliminate the possibility of SQL injection in all user‑controlled fields.

Generated by OpenCVE AI on March 26, 2026 at 21:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Hcl
Hcl aftermarket Dpc
Vendors & Products Hcl
Hcl aftermarket Dpc

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Hcltech
Hcltech aftermarket Cloud
Weaknesses CWE-89
CPEs cpe:2.3:a:hcltech:aftermarket_cloud:1.0.0:*:*:*:*:*:*:*
Vendors & Products Hcltech
Hcltech aftermarket Cloud

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database.
Title HCL Aftermarket DPC is affected by SQL Injection
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H'}


Subscriptions

Hcl Aftermarket Dpc
Hcltech Aftermarket Cloud
cve-icon MITRE

Status: PUBLISHED

Assigner: HCL

Published:

Updated: 2026-03-26T15:05:41.196Z

Reserved: 2025-08-12T06:59:56.644Z

Link: CVE-2025-55262

cve-icon Vulnrichment

Updated: 2026-03-26T15:05:33.832Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T14:16:07.863

Modified: 2026-03-26T20:00:28.643

Link: CVE-2025-55262

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:28:21Z

Weaknesses