HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or if it is stored in insecure repositories, they can easily retrieve these hardcoded secrets.
PUBLISHED5.2CWE-798
HCL Aftermarket DPC is affected by Hardcoded Sensitive Data
Problem type
Affected products
HCL
Aftermarket DPC
version 1.0.0 - AFFECTED
References
support.hcl-software.com
https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-55263Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-55263",
"assignerOrgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"assignerShortName": "HCL",
"dateUpdated": "2026-03-26T18:34:31.869Z",
"dateReserved": "2025-08-12T06:59:56.644Z",
"datePublished": "2026-03-26T13:05:07.172Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"shortName": "HCL",
"dateUpdated": "2026-03-26T13:05:07.172Z"
},
"title": "HCL Aftermarket DPC is affected by Hardcoded Sensitive Data",
"descriptions": [
{
"lang": "en",
"value": "HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or if it is stored in insecure repositories, they can easily retrieve these hardcoded secrets.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or if it is stored in insecure repositories, they can easily retrieve these hardcoded secrets."
}
]
}
],
"affected": [
{
"vendor": "HCL",
"product": "Aftermarket DPC",
"defaultStatus": "unaffected",
"versions": [
{
"version": "version 1.0.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-798: Use of Hardcoded Credentials",
"cweId": "CWE-798",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T18:34:31.869Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}