Improper authentication in the API authentication middleware of HCL DevOps Loop allows authentication tokens to be accepted without proper validation of their expiration and cryptographic signature. As a result, an attacker could potentially use expired or tampered tokens to gain unauthorized access to sensitive resources and perform actions with elevated privileges.
History

Thu, 06 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Hcltech
Hcltech devops Loop
Vendors & Products Hcltech
Hcltech devops Loop

Wed, 05 Nov 2025 23:00:00 +0000

Type Values Removed Values Added
Description Improper authentication in the API authentication middleware of HCL DevOps Loop allows authentication tokens to be accepted without proper validation of their expiration and cryptographic signature. As a result, an attacker could potentially use expired or tampered tokens to gain unauthorized access to sensitive resources and perform actions with elevated privileges.
Title HCL DevOps Loop is susceptible to an improper authentication vulnerability
Weaknesses CWE-347
CWE-613
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HCL

Published: 2025-11-05T22:44:17.256Z

Updated: 2025-11-06T21:20:55.355Z

Reserved: 2025-08-12T07:00:17.743Z

Link: CVE-2025-55278

cve-icon Vulnrichment

Updated: 2025-11-06T21:20:51.347Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-05T23:16:05.147

Modified: 2025-11-06T19:45:09.883

Link: CVE-2025-55278

cve-icon Redhat

No data.