CVE-2025-52647
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-10

Last updated on: 2025-10-14

Assigner: HCL Software

Description
The BigFix WebUI application responds with HOST information from the HTTP header field making it vulnerable to Host Header Poisoning Attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-10
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-10-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hcl bigfix_webui 3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-644 The product does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web browser components that can process raw headers, such as Flash.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because the BigFix WebUI application uses the HOST information directly from the HTTP header field without proper validation, making it susceptible to Host Header Poisoning Attacks. An attacker can manipulate the HOST header to inject malicious data or redirect users.


How can this vulnerability impact me? :

The vulnerability can lead to information disclosure and integrity issues, as indicated by the CVSS score showing low confidentiality and integrity impacts. It may allow attackers to poison host headers, potentially causing incorrect application behavior, redirecting users, or exploiting trust relationships.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart