CWE
20
Advisory Published

cisco-sa-wbx-linkinj-WWZpVqu9: Cisco Webex Meetings and Cisco Webex Meetings Server Software Hyperlink Injection Vulnerability

First published: Wed Feb 03 2021(Updated: )

A vulnerability in the user interface of Cisco Webex Meetings and Cisco Webex Meetings Server Software could allow an authenticated, remote attacker to inject a hyperlink into a meeting invitation email. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by entering a URL into a field in the user interface. A successful exploit could allow the attacker to generate a Webex Meetings invitation email that contains a link to a destination of their choosing. Because this email is sent from a trusted source, the recipient may be more likely to click the link. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wbx-linkinj-WWZpVqu9

Credit: Abhinav Khanna eSec Forte Technologies

Affected SoftwareAffected VersionHow to fix
Cisco Webex Meetings Client
Cisco Webex Meetings Server

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-wbx-linkinj-WWZpVqu9?

    The severity of the cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability is considered high due to the potential for remote attackers to inject malicious hyperlinks.

  • How do I fix cisco-sa-wbx-linkinj-WWZpVqu9?

    To mitigate the cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability, update to the latest version of Cisco Webex Meetings or the Cisco Webex Meetings Server Software as recommended by Cisco.

  • What systems are affected by cisco-sa-wbx-linkinj-WWZpVqu9?

    The cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability affects Cisco Webex Meetings Client and Cisco Webex Meetings Server Software.

  • Who can exploit cisco-sa-wbx-linkinj-WWZpVqu9?

    Authenticated remote attackers can exploit the cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability to inject malicious hyperlinks into meeting invitation emails.

  • What type of attack does cisco-sa-wbx-linkinj-WWZpVqu9 facilitate?

    The cisco-sa-wbx-linkinj-WWZpVqu9 vulnerability facilitates phishing attacks by allowing an attacker to manipulate meeting invitation content.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203