CVE-2025-55271
Published: 26 March 2026
Summary
CVE-2025-55271 is a low-severity HTTP Request/Response Splitting (CWE-113) vulnerability in Hcltech Aftermarket Cloud. Its CVSS base score is 3.1 (Low).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 enforces validation of user inputs to block CRLF injections that enable HTTP response splitting in HCL Aftermarket DPC.
SI-15 filters information outputs to neutralize split responses and prevent injection of harmful content or arbitrary commands.
SI-2 remediates the specific flaw in HCL Aftermarket DPC responsible for improper HTTP response handling, preventing exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote exploitation of a public-facing web application via HTTP response splitting (CWE-113).
NVD Description
HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response..
Deeper analysisAI
CVE-2025-55271 is an HTTP Response Splitting vulnerability (CWE-113) affecting HCL Aftermarket DPC. Published on 2026-03-26T13:16:26.567, it has a CVSS v3.1 base score of 3.1 (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N), indicating low severity with network accessibility but high attack complexity, no privileges required, and user interaction needed.
An unauthenticated remote attacker can exploit this vulnerability over the network by inducing response splitting. Depending on how the affected web application processes the split response, the attacker may execute arbitrary commands or inject harmful content, potentially leading to low-impact confidentiality disclosure.
The HCL support knowledge base article at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793 provides details on mitigation and related advisories for this vulnerability.
Details
- CWE(s)