A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-26 17:15
Updated : 2025-07-31 17:34
NVD link : CVE-2025-20116
Mitre link : CVE-2025-20116
CVE.ORG link : CVE-2025-20116
JSON object : View
Products Affected
cisco
- application_policy_infrastructure_controller
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
