HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response..
PUBLISHED5.2CWE-113
HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability
Problem type
Affected products
HCL
Aftermarket DPC
version 1.0.0 - AFFECTED
References
support.hcl-software.com
https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-55271Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-55271",
"assignerOrgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"assignerShortName": "HCL",
"dateUpdated": "2026-03-26T15:01:42.798Z",
"dateReserved": "2025-08-12T07:00:17.741Z",
"datePublished": "2026-03-26T12:59:30.264Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1e47fe04-f25f-42fa-b674-36de2c5e3cfc",
"shortName": "HCL",
"dateUpdated": "2026-03-26T12:59:30.264Z"
},
"title": "HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability",
"descriptions": [
{
"lang": "en",
"value": "HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response..",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response.."
}
]
}
],
"affected": [
{
"vendor": "HCL",
"product": "Aftermarket DPC",
"defaultStatus": "unaffected",
"versions": [
{
"version": "version 1.0.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-113: Improper Control of HTTP Messages and Headers",
"cweId": "CWE-113",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129793"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T15:01:42.798Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}