Impact
The vulnerability involves improper input validation that permits the injection of executable code, potentially enabling agents to perform cross‑site scripting, SQL injection, and command injection attacks. These capabilities could allow an attacker to execute arbitrary commands or inject malicious scripts into the application environment.
Affected Systems
HCL Aftermarket DPC is affected by this flaw. No specific version numbers are listed in the advisory, but the vulnerability applies to the product identified as HCL Aftermarket DPC.
Risk and Exploitability
The CVSS score is 3.5, indicating low severity; EPSS data is unavailable and the issue is not listed in the KEV catalog. The likely attack vector appears to be through web‑based input fields, as the flaw involves input validation. While the risk score is low, the ability to inject executable code presents a non‑trivial security concern for systems running the affected product.
OpenCVE Enrichment