Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20274: Unrestricted Upload of File with Dangerous Type in Cisco Cisco Unified Contact Center Express

0
Medium
VulnerabilityCVE-2025-20274cvecve-2025-20274
Published: Wed Jul 16 2025 (07/16/2025, 16:16:28 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Unified Contact Center Express

Description

A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system and execute arbitrary commands on the operating system. The Security Impact Rating (SIR) of this advisory has been raised to High because an attacker could elevate privileges to root. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Report Designer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:22:31 UTC

Technical Analysis

CVE-2025-20274 is a security vulnerability identified in Cisco Unified Contact Center Express (UCCX), specifically within the web-based management interface of Cisco Unified Intelligence Center. The root cause is improper validation of uploaded files, which allows an authenticated attacker with at least Report Designer role privileges to upload arbitrary files to the system. This unrestricted file upload can be leveraged to store malicious files on the device and execute arbitrary commands on the underlying operating system. The vulnerability affects a wide range of UCCX versions, including 10.5(1), 10.6(1), 11.x, and 12.x releases, along with numerous service updates and extensions, indicating a broad attack surface. The Security Impact Rating has been elevated to High due to the potential for privilege escalation to root, which could lead to full system compromise. Exploitation requires valid user credentials but does not require user interaction beyond authentication. The CVSS v3.1 score of 6.3 reflects a medium severity, factoring in network attack vector, low attack complexity, required privileges, and no user interaction. No public exploits or active exploitation have been reported to date. The vulnerability underscores the risk of insufficient input validation in web management interfaces, particularly in critical enterprise communication infrastructure.

Potential Impact

The impact of CVE-2025-20274 is significant for organizations relying on Cisco Unified Contact Center Express for their contact center operations. Successful exploitation could allow attackers to upload and execute malicious files, leading to unauthorized command execution and potential full system compromise through privilege escalation to root. This threatens the confidentiality, integrity, and availability of the affected systems. Attackers could manipulate call center data, disrupt customer service operations, or use the compromised system as a foothold for lateral movement within the corporate network. Given the critical role of contact center infrastructure in customer engagement and business continuity, exploitation could result in operational downtime, data breaches involving sensitive customer information, and reputational damage. The requirement for valid credentials limits the attack vector to insiders or attackers who have compromised legitimate accounts, but the broad range of affected versions means many organizations remain vulnerable if patches are not applied promptly.

Mitigation Recommendations

To mitigate CVE-2025-20274, organizations should immediately identify and inventory all Cisco Unified Contact Center Express deployments and verify their software versions against the affected list. Cisco is expected to release patches or updates addressing this vulnerability; applying these updates promptly is critical. Until patches are available, restrict access to the web-based management interface to trusted administrators only, ideally through network segmentation, VPNs, or IP whitelisting. Implement strong authentication controls, including multi-factor authentication, to reduce the risk of credential compromise. Regularly audit user accounts and roles to ensure only necessary privileges are assigned, minimizing the number of users with Report Designer or higher roles. Monitor logs for unusual file upload activity or command execution attempts. Employ intrusion detection and prevention systems to detect anomalous behavior related to file uploads or privilege escalation. Finally, conduct security awareness training to reduce the risk of credential theft and insider threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.246Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6877d3d0a83201eaacdc65cf

Added to database: 7/16/2025, 4:31:12 PM

Last enriched: 2/26/2026, 10:22:31 PM

Last updated: 3/24/2026, 12:57:41 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses