Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20117: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Unified Contact Center Express

0
Medium
VulnerabilityCVE-2026-20117cvecve-2026-20117
Published: Wed Mar 11 2026 (03/11/2026, 16:31:26 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Unified Contact Center Express

Description

A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

AI-Powered Analysis

AILast updated: 03/11/2026, 17:16:14 UTC

Technical Analysis

CVE-2026-20117 is a medium severity cross-site scripting (XSS) vulnerability found in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX). The root cause is improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be injected into specific pages of the interface. An unauthenticated remote attacker can exploit this flaw by crafting specially crafted requests that inject arbitrary JavaScript code. When a legitimate user accesses the affected interface pages, the malicious script executes within their browser context, potentially leading to theft of session cookies, credentials, or other sensitive information accessible via the browser. The vulnerability affects a broad range of Unified CCX versions, spanning from 10.5(1) to 15.0(1) and multiple sub-releases, reflecting a large installed base. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, no privileges required, user interaction needed, scope changed, and low impact on confidentiality and integrity, with no impact on availability. Although no known exploits are currently in the wild, the widespread deployment of Cisco Unified CCX in enterprise contact centers makes this vulnerability a significant concern. The vulnerability could be leveraged to conduct targeted phishing or session hijacking attacks against administrators managing the contact center infrastructure.

Potential Impact

The impact of CVE-2026-20117 is primarily on confidentiality and integrity within organizations using Cisco Unified Contact Center Express. Successful exploitation could allow attackers to execute arbitrary scripts in the context of the management interface, potentially leading to theft of administrative session tokens, credentials, or sensitive configuration data. This could enable further compromise of the contact center environment or pivoting into broader enterprise networks. Since the vulnerability requires user interaction, the risk is somewhat mitigated but remains significant given the critical role of contact center systems in customer communications and data handling. Exploitation could disrupt trust in customer interactions, lead to data leakage, or facilitate social engineering attacks. The broad range of affected versions and the common use of Cisco Unified CCX in large enterprises worldwide increase the potential attack surface. While availability is not impacted, the confidentiality breach could have regulatory and reputational consequences, especially in sectors handling sensitive customer data such as finance, healthcare, and telecommunications.

Mitigation Recommendations

Organizations should immediately assess their Cisco Unified Contact Center Express deployments to identify affected versions. Cisco typically releases patches or updates to address such vulnerabilities; applying the latest security updates is the most effective mitigation. If patches are not yet available, administrators should restrict access to the web-based management interface using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted personnel only. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns can help mitigate exploitation attempts. Educate administrators and users to recognize phishing attempts and suspicious links that could trigger XSS payloads. Additionally, enabling Content Security Policy (CSP) headers on the management interface can reduce the risk of script injection exploitation. Regularly monitor logs for unusual activity or repeated access attempts to the management interface. Finally, consider multi-factor authentication (MFA) for administrative access to reduce the risk of session hijacking post-exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.376Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b19f882f860ef9434a76c3

Added to database: 3/11/2026, 4:59:52 PM

Last enriched: 3/11/2026, 5:16:14 PM

Last updated: 3/13/2026, 11:45:48 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses