<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2025-55262 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-55262/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 14:16:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-55262/feed.xml" rel="self" type="application/rss+xml"/><item><title>HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)</title><link>https://feed.craftedsignal.io/briefs/2026-03-hcl-aftermarket-sql-injection/</link><pubDate>Thu, 26 Mar 2026 14:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-hcl-aftermarket-sql-injection/</guid><description>CVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.</description><content:encoded>&lt;p>A SQL Injection vulnerability, identified as CVE-2025-55262, affects HCL Aftermarket DPC. This vulnerability allows an attacker to inject malicious SQL code into input fields, which can then be executed by the database. Successful exploitation could lead to the retrieval of sensitive information from the database, potentially exposing user credentials, financial data, or other confidential information. The vulnerability was reported by HCL Software and has a CVSS v3.1 score of 8.3, indicating a…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2025-55262</category><category>sql-injection</category><category>web-application</category></item></channel></rss>