A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc | Vendor Advisory |
Configurations
History
31 Jul 2025, 16:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:* | |
First Time |
Cisco
Cisco enterprise Chat And Email |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc - Vendor Advisory |
03 Jul 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-02 16:15
Updated : 2025-07-31 16:58
NVD link : CVE-2025-20310
Mitre link : CVE-2025-20310
CVE.ORG link : CVE-2025-20310
JSON object : View
Products Affected
cisco
- enterprise_chat_and_email
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')