CVE-2025-52650
📋 TL;DR
This vulnerability allows inline script execution despite Content Security Policy (CSP) restrictions in HCL AION v2.0. Attackers can bypass CSP protections to execute malicious JavaScript in users' browsers. Organizations using HCL AION v2.0 are affected.
💻 Affected Systems
- HCL AION
📦 What is this software?
Aion by Hcltech
⚠️ Risk & Real-World Impact
Worst Case
Complete client-side compromise allowing cross-site scripting (XSS), session hijacking, credential theft, and redirection to malicious sites.
Likely Case
Cross-site scripting attacks leading to session theft, data exfiltration, or unauthorized actions within the application.
If Mitigated
Limited impact if CSP is properly configured with additional layers of protection, though some script execution may still occur.
🎯 Exploit Status
Exploitation requires attacker to inject or deliver malicious scripts to users, but technical complexity is low once access is achieved.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched version
Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0124444
Restart Required: Yes
Instructions:
1. Review vendor advisory KB0124444. 2. Download and apply the official patch from HCL. 3. Restart the AION application. 4. Verify CSP enforcement is working correctly.
🔧 Temporary Workarounds
Strict CSP Configuration
allImplement strict Content Security Policy headers to limit script execution sources
Add 'Content-Security-Policy: script-src 'self';' to web server configuration
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block inline script patterns
- Enable additional browser security features and monitoring for script execution anomalies
🔍 How to Verify
Check if Vulnerable:
Check if HCL AION version is 2.0 and test if inline scripts execute despite CSP headers
Check Version:
Check AION administration console or configuration files for version information
Verify Fix Applied:
Test that inline scripts are properly blocked after applying patch and verify CSP headers are enforced
📡 Detection & Monitoring
Log Indicators:
- Unexpected script execution events
- CSP violation reports in browser console logs
- Unusual user activity patterns
Network Indicators:
- Unexpected script sources in HTTP responses
- CSP header anomalies
SIEM Query:
source="web_server" AND (message="CSP violation" OR message="script execution")