CVE-2025-52650

8.2 HIGH

📋 TL;DR

This vulnerability allows inline script execution despite Content Security Policy (CSP) restrictions in HCL AION v2.0. Attackers can bypass CSP protections to execute malicious JavaScript in users' browsers. Organizations using HCL AION v2.0 are affected.

💻 Affected Systems

Products:
  • HCL AION
Versions: v2.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of HCL AION v2.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete client-side compromise allowing cross-site scripting (XSS), session hijacking, credential theft, and redirection to malicious sites.

🟠

Likely Case

Cross-site scripting attacks leading to session theft, data exfiltration, or unauthorized actions within the application.

🟢

If Mitigated

Limited impact if CSP is properly configured with additional layers of protection, though some script execution may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires attacker to inject or deliver malicious scripts to users, but technical complexity is low once access is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0124444

Restart Required: Yes

Instructions:

1. Review vendor advisory KB0124444. 2. Download and apply the official patch from HCL. 3. Restart the AION application. 4. Verify CSP enforcement is working correctly.

🔧 Temporary Workarounds

Strict CSP Configuration

all

Implement strict Content Security Policy headers to limit script execution sources

Add 'Content-Security-Policy: script-src 'self';' to web server configuration

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block inline script patterns
  • Enable additional browser security features and monitoring for script execution anomalies

🔍 How to Verify

Check if Vulnerable:

Check if HCL AION version is 2.0 and test if inline scripts execute despite CSP headers

Check Version:

Check AION administration console or configuration files for version information

Verify Fix Applied:

Test that inline scripts are properly blocked after applying patch and verify CSP headers are enforced

📡 Detection & Monitoring

Log Indicators:

  • Unexpected script execution events
  • CSP violation reports in browser console logs
  • Unusual user activity patterns

Network Indicators:

  • Unexpected script sources in HTTP responses
  • CSP header anomalies

SIEM Query:

source="web_server" AND (message="CSP violation" OR message="script execution")

🔗 References

📤 Share & Export