HCL Aftermarket DPC is affected by Missing Functional Level Access Control which will allow attacker to escalate his privileges and may compromise the application and may steal and manipulate the data.
PUBLISHED5.2CWE-284
HCL Aftermarket DPC is affected by Missing Functional Level Access Control
Problem type
Affected products
HCL
Aftermarket DPC
version 1.0.0 - AFFECTED
References
support.hcl-software.com
https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-55261Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-55261",
"assignerOrgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"assignerShortName": "HCL",
"dateUpdated": "2026-03-26T14:58:51.799Z",
"dateReserved": "2025-08-12T06:59:56.644Z",
"datePublished": "2026-03-26T13:10:27.889Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"shortName": "HCL",
"dateUpdated": "2026-03-26T13:10:27.889Z"
},
"title": "HCL Aftermarket DPC is affected by Missing Functional Level Access Control",
"descriptions": [
{
"lang": "en",
"value": "HCL Aftermarket DPC is affected by Missing Functional Level Access Control which will allow attacker to escalate his privileges and may compromise the application and may steal and manipulate the data.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "HCL Aftermarket DPC is affected by Missing Functional Level Access Control which will allow attacker to escalate his privileges and may compromise the application and may steal and manipulate the data."
}
]
}
],
"affected": [
{
"vendor": "HCL",
"product": "Aftermarket DPC",
"defaultStatus": "unaffected",
"versions": [
{
"version": "version 1.0.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-284: Improper Access Control.",
"cweId": "CWE-284",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T14:58:51.799Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}