CVE-2025-52647
BaseFortify
Publication date: 2025-10-10
Last updated on: 2025-10-14
Assigner: HCL Software
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hcl | bigfix_webui | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-644 | The product does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web browser components that can process raw headers, such as Flash. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because the BigFix WebUI application uses the HOST information directly from the HTTP header field without proper validation, making it susceptible to Host Header Poisoning Attacks. An attacker can manipulate the HOST header to inject malicious data or redirect users.
How can this vulnerability impact me? :
The vulnerability can lead to information disclosure and integrity issues, as indicated by the CVSS score showing low confidentiality and integrity impacts. It may allow attackers to poison host headers, potentially causing incorrect application behavior, redirecting users, or exploiting trust relationships.