CVE-2025-20328
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-03

Last updated on: 2025-09-10

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the user profile component of Cisco Webex Meetings could have allowed an authenticated, remote attacker with low privileges to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed because of insufficient validation of user-supplied input to the user profile component of Cisco Webex Meetings. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could have allowed the attacker to conduct an XSS attack against the targeted user.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-03
Last Modified
2025-09-10
Generated
2026-05-07
AI Q&A
2025-09-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco webex_meetings *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross-site scripting (XSS) flaw in the user profile component of Cisco Webex Meetings. It allows an authenticated remote attacker with low privileges to inject malicious scripts by persuading a user to click a crafted link in the web-based interface. The issue arises from insufficient validation of user-supplied input in the user profile component.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to execute malicious scripts in the context of a targeted user's browser session. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the user within the Cisco Webex Meetings web interface.


What immediate steps should I take to mitigate this vulnerability?

Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart