Cyber Posture

CVE-2025-55270

Low

Published: 26 March 2026

Published
26 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
EPSS Score 0.0002 5.7th percentile
Risk Priority 7 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55270 is a low-severity Improper Input Validation (CWE-20) vulnerability in Hcltech Aftermarket Cloud. Its CVSS base score is 3.5 (Low).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validating user inputs at entry points to prevent injection of executable code enabling XSS, SQL injection, and command injection.

prevent

Mandates output filtering to mitigate XSS attacks arising from unvalidated inputs reflected in responses.

prevent

Ensures timely remediation of the specific improper input validation flaw documented in this CVE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Improper input validation directly enables remote code/command injection (XSS/SQL/command) in a network-exposed app, mapping to public app exploitation and command interpreter execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

HCL Aftermarket DPC is affected by Improper Input Validation which allows an attacker to inject executable code and can carry out attacks such as XSS, SQL Injection, Command Injection etc.

Deeper analysisAI

CVE-2025-55270 is an Improper Input Validation vulnerability (CWE-20) affecting HCL Aftermarket DPC software. Published on 2026-03-26 with a CVSS v3.1 base score of 3.5 (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N), it enables attackers to inject executable code through inadequate validation of user inputs, potentially facilitating attacks such as cross-site scripting (XSS), SQL injection, and command injection.

Exploitation is feasible over the network with low complexity by an authenticated attacker possessing low privileges, though it requires user interaction to succeed. The impact is limited to low confidentiality disclosure, allowing potential access to sensitive data without affecting integrity or availability.

Mitigation details are available in the vendor advisory from HCL Software at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793.

Details

CWE(s)

Affected Products

hcltech
aftermarket cloud
1.0.0

CVEs Like This One

CVE-2025-55262Same product: Hcltech Aftermarket Cloud
CVE-2025-55271Same product: Hcltech Aftermarket Cloud
CVE-2025-55261Same product: Hcltech Aftermarket Cloud
CVE-2025-55267Same product: Hcltech Aftermarket Cloud
CVE-2025-55263Same product: Hcltech Aftermarket Cloud
CVE-2025-55265Same product: Hcltech Aftermarket Cloud
CVE-2025-55269Same product: Hcltech Aftermarket Cloud
CVE-2025-55275Same product: Hcltech Aftermarket Cloud
CVE-2024-42175Same vendor: Hcltech
CVE-2026-22615Shared CWE-20

References