First published: Wed Feb 26 2025(Updated: )
A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20116 is considered a high severity vulnerability due to its potential for stored XSS attacks.
To mitigate CVE-2025-20116, ensure that your Cisco APIC is updated to the latest patched version provided by Cisco.
CVE-2025-20116 affects systems running the Cisco Application Policy Infrastructure Controller that are accessed by authenticated users.
CVE-2025-20116 allows authenticated remote attackers to perform stored XSS attacks on affected systems.
An attacker must possess valid administrative credentials to successfully exploit CVE-2025-20116.