{"api_version":"1","generated_at":"2026-05-13T05:23:47+00:00","cve":"CVE-2025-62320","urls":{"html":"https://cve.report/CVE-2025-62320","api":"https://cve.report/api/cve/CVE-2025-62320.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-62320","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-62320"},"summary":{"title":"HTML Injection Leading to Data Exfiltration to External Server vulnerability affects HCL Unica Platform","description":"HTML Injection can be carried out in Product when a web application does not properly check or clean user input before showing it on a webpage. Because of this, an attacker may insert unwanted HTML code into the page. When the browser loads the page, it may automatically interact with external resources included in that HTML, which can cause unexpected requests from the user’s browser.","state":"PUBLISHED","assigner":"HCL","published_at":"2026-03-17 13:16:16","updated_at":"2026-05-11 14:18:40"},"problem_types":["CWE-79","CWE-79 CWE-79 Improper neutralization of input during web page generation ('cross-site scripting')"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"6.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"psirt@hcl.com","type":"Secondary","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129460","name":"https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129460","refsource":"psirt@hcl.com","tags":["Patch","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-62320","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-62320","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"HCL","product":"Sametime","version":"affected version 25.1.1 and below.","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2025","cve_id":"62320","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hcltech","cpe5":"unica","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"62320","cve":"CVE-2025-62320","epss":"0.000350000","percentile":"0.104350000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:53"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-62320","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-17T12:56:45.655304Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-17T12:56:51.604Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Sametime","vendor":"HCL","versions":[{"status":"affected","version":"version 25.1.1 and below."}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"HTML Injection can be carried out in Product when a web application does not properly check or clean user input before showing it on a webpage. Because of this, an attacker may insert unwanted HTML code into the page. When the browser loads the page, it may automatically interact with external resources included in that HTML, which can cause unexpected requests from the user’s browser."}],"value":"HTML Injection can be carried out in Product when a web application does not properly check or clean user input before showing it on a webpage. Because of this, an attacker may insert unwanted HTML code into the page. When the browser loads the page, it may automatically interact with external resources included in that HTML, which can cause unexpected requests from the user’s browser."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper neutralization of input during web page generation ('cross-site scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-17T12:02:08.881Z","orgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","shortName":"HCL"},"references":[{"url":"https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129460"}],"source":{"discovery":"UNKNOWN"},"title":"HTML Injection Leading to Data Exfiltration to External Server vulnerability affects HCL Unica Platform","x_generator":{"engine":"Vulnogram 1.0.0"}}},"cveMetadata":{"assignerOrgId":"1e47fe04-f25f-42fa-b674-36de2c5e3cfc","assignerShortName":"HCL","cveId":"CVE-2025-62320","datePublished":"2026-03-17T12:02:08.881Z","dateReserved":"2025-10-10T09:04:19.898Z","dateUpdated":"2026-03-17T12:56:51.604Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-17 13:16:16","lastModifiedDate":"2026-05-11 14:18:40","problem_types":["CWE-79","CWE-79 CWE-79 Improper neutralization of input during web page generation ('cross-site scripting')"],"metrics":{"cvssMetricV31":[{"source":"psirt@hcl.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"305B2D5D-64DB-40FC-9188-CCF3EA5764F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"10B800BE-C835-4E99-A05F-FF5B0C8556F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_audience_central:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"C3B128F6-5258-4CD7-9B8B-2EA82575046B"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_audience_central:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"56033CC8-1562-481D-9781-68605E639D33"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_campaign:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"DBD704E0-EC17-40EF-B125-A3F7B2265C87"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_campaign:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"21A943C9-F93D-4385-9FA2-D7970FDF2CF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_centralised_offer_management:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"62BA1D1F-E3A6-4F78-98C8-C5BF4C28BB45"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_centralised_offer_management:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"122EAB2F-BB96-4954-93F9-82FB61D27A5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_contact_central:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"7CB92F37-C4B6-403B-A150-C9BCB094CD41"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_contact_central:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"A55CF519-0F7B-469D-96FE-D29DEDC35C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_interact:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"23118E78-677A-4E04-ABAA-7A301B45FFB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_interact:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"73B4E36F-D53D-4E3C-92DA-97151A2BCEDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_journey:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"A7802A1C-BE9A-45BB-81EE-C1836BB6933C"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_journey:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"206F9793-8910-45B1-8249-B3F04B326AB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_plan:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"7D193791-017A-4E65-A183-4780E3DE37AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_plan:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"2EDC3A16-B40C-44D0-BEDB-8EBEE9671B58"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_segment_central:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","matchCriteriaId":"13A74D83-78CC-495E-AC56-90C472725477"},{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:unica_segment_central:*:*:*:*:*:*:*:*","versionStartIncluding":"25.1.0","versionEndExcluding":"25.1.1.0.1","matchCriteriaId":"5C9D635D-AB51-43CF-B5C5-6E013191A637"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"62320","Ordinal":"1","Title":"HTML Injection Leading to Data Exfiltration to External Server v","CVE":"CVE-2025-62320","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"62320","Ordinal":"1","NoteData":"HTML Injection can be carried out in Product when a web application does not properly check or clean user input before showing it on a webpage. Because of this, an attacker may insert unwanted HTML code into the page. When the browser loads the page, it may automatically interact with external resources included in that HTML, which can cause unexpected requests from the user’s browser.","Type":"Description","Title":"HTML Injection Leading to Data Exfiltration to External Server v"}]}}}