Cyber Posture

CVE-2025-52628

Medium

Published: 03 February 2026

Published
03 February 2026
Modified
25 April 2026
KEV Added
Patch
CVSS Score 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
EPSS Score 0.0005 16.8th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-52628 is a medium-severity Sensitive Cookie with Improper SameSite Attribute (CWE-1275) vulnerability in Hcltech Aion. Its CVSS base score is 4.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing SameSite cookie attribute directly enables cross-site request forgery against the public-facing HCL AION web application, matching the definition of T1190.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

HCL AION is affected by a Cookie with Insecure, Improper, or Missing SameSite vulnerability. This can allow cookies to be sent in cross-site requests, potentially increasing exposure to cross-site request forgery and related security risks. This issue affects AION: 2.0.

Deeper analysisAI

CVE-2025-52628, published on 2026-02-03, is a Cookie with Insecure, Improper, or Missing SameSite vulnerability (CWE-1275) affecting HCL AION version 2.0. This flaw allows cookies to be sent in cross-site requests, potentially increasing exposure to cross-site request forgery (CSRF) and related security risks. The vulnerability has a CVSS v3.1 base score of 4.6 (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L), indicating medium severity with network accessibility, low attack complexity, and requirements for low privileges and user interaction.

Exploitation requires an attacker to have low privileges (PR:L) and relies on user interaction (UI:R), such as tricking an authenticated victim into initiating a cross-site request from a malicious site. Successful attacks can achieve low impacts on integrity (I:L) and availability (A:L), with no confidentiality impact (C:N), enabling scenarios like unauthorized actions performed on the victim's behalf due to improper cookie handling.

HCL provides mitigation guidance in its support knowledge base article at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0127972.

Details

CWE(s)

Affected Products

hcltech
aion
2.0.0

CVEs Like This One

CVE-2025-52636Same product: Hcltech Aion
CVE-2025-52626Same product: Hcltech Aion
CVE-2025-52643Same product: Hcltech Aion
CVE-2025-55252Same product: Hcltech Aion
CVE-2025-52644Same product: Hcltech Aion
CVE-2025-52631Same product: Hcltech Aion
CVE-2025-52660Same product: Hcltech Aion
CVE-2025-52627Same product: Hcltech Aion
CVE-2025-52659Same product: Hcltech Aion
CVE-2025-55251Same product: Hcltech Aion

References