{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2025-55262/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2025-55262","sql-injection","web-application"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA SQL Injection vulnerability, identified as CVE-2025-55262, affects HCL Aftermarket DPC. This vulnerability allows an attacker to inject malicious SQL code into input fields, which can then be executed by the database. Successful exploitation could lead to the retrieval of sensitive information from the database, potentially exposing user credentials, financial data, or other confidential information. The vulnerability was reported by HCL Software and has a CVSS v3.1 score of 8.3, indicating a…\u003c/p\u003e\n","date_modified":"2026-03-26T14:16:07Z","date_published":"2026-03-26T14:16:07Z","id":"/briefs/2026-03-hcl-aftermarket-sql-injection/","summary":"CVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.","title":"HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)","url":"https://feed.craftedsignal.io/briefs/2026-03-hcl-aftermarket-sql-injection/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2025-55262","version":"https://jsonfeed.org/version/1.1"}