First published: Wed May 07 2025(Updated: )
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a stored cross-site scripting attack (XSS) on an affected system. This vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20147 is rated as a critical severity vulnerability due to its potential for remote exploitation.
To fix CVE-2025-20147, ensure to update your Cisco Catalyst SD-WAN Manager to the latest patched version provided by Cisco.
CVE-2025-20147 affects authenticated users of Cisco Catalyst SD-WAN Manager who can potentially be exploited by attackers.
CVE-2025-20147 is associated with a stored cross-site scripting (XSS) attack.
The impact of CVE-2025-20147 includes the possible execution of malicious scripts in the context of an authenticated user's session.