CVE-2025-52622
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-04
Assigner: HCL Software
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hcl | bigfix | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1188 | The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the BigFix SaaS application missing certain security headers in its HTTP responses. These headers are important for protecting the client side from common web attacks such as Cross-Site Scripting (XSS), Clickjacking, and protocol downgrade attacks. Without these headers, the application is more vulnerable to these types of attacks.
How can this vulnerability impact me? :
The absence of security headers weakens the client-side security of the application, increasing the risk that attackers could exploit vulnerabilities like Cross-Site Scripting (XSS), Clickjacking, or protocol downgrade attacks. This could lead to unauthorized actions, data theft, or manipulation of the application from the user's browser.