TROYANOSYVIRUS
Back to CVEs

CVE-2025-20116

MEDIUM
4.8

Description

A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.

CVE Details

CVSS v3.1 Score4.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionREQUIRED
Published2/26/2025
Last Modified7/31/2025
Sourcenvd
Honeypot Sightings0

Affected Products

cisco:application_policy_infrastructure_controller

Weaknesses (CWE)

CWE-79

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.