Impact
HCL Traveler contains a weakness in its default validation of HTTP headers that can allow an attacker to bypass additional authentication checks. The flaw does not grant direct code execution but can lead to unauthorized access to the application, exposing data or services that normally would require proper authentication. The vulnerability is a classic case of insufficient input validation leading to a privilege escalation within the application’s authentication flow.
Affected Systems
The vulnerability affects HCL Software’s Traveler product. No specific version numbers are provided in the CNA data, so all deployed instances should be evaluated for the presence of this weak header validation behavior.
Risk and Exploitability
The CVSS score of 6.3 indicates moderate severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not yet widely exploited. The likely attack vector involves remote HTTP requests, leveraging the weak header checks to bypass authentication. Because the flaw can be triggered over the network, it poses a risk to any publicly reachable Traveler installation.
OpenCVE Enrichment