CVE-2025-20289
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-19
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | identity_services_engine | to 3.1.0 (inc) |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.4.0 |
| cisco | identity_services_engine | 3.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves multiple reflected Cross-Site Scripting (XSS) issues in the web-based management interface of Cisco ISE and Cisco ISE-PIC. An authenticated remote attacker with at least low-privileged access can inject malicious code into specific pages of the interface due to insufficient validation of user-supplied input. This allows the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow an attacker to execute arbitrary scripts within the context of the affected interface, potentially leading to unauthorized access to sensitive information stored in the browser or manipulation of the interface. This could compromise the security of the management system and lead to further attacks or data exposure.