A vulnerability in a subset of REST APIs of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, low-privileged, remote attacker to conduct a blind SQL injection attack.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected API. A successful exploit could allow the attacker to view data in some database tables on an affected device.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-07-16 17:15
Updated : 2025-07-31 15:15
NVD link : CVE-2025-20272
Mitre link : CVE-2025-20272
CVE.ORG link : CVE-2025-20272
JSON object : View
Products Affected
cisco
- evolved_programmable_network_manager
- prime_infrastructure
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
