Description
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a reflected XSS attack against a user of the interface.

This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Published: 2026-04-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting enabling arbitrary JavaScript execution in the Unity Connection web interface
Action: Apply Patch
AI Analysis

Impact

A reflected XSS flaw exists in Cisco Unity Connection’s web‑based management interface because user input is not properly sanitized. An attacker can craft a URL that, when clicked by an administrator or other privileged user, injects malicious JavaScript into the browser session. This allows the attacker to execute arbitrary script code with the same privileges as the victim, potentially stealing session cookies or other data visible to the browser. The weakness is a canonical input‑validation issue listed as CWE‑79.

Affected Systems

Cisco Unity Connection across all released versions, as no specific affected version list is provided in the advisory. All installations should be assessed for the vulnerable input handling paths.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity when successful. Exploit probability is not presently recorded, and there is no report of large‑scale exploitation. Attack vectors are remote and unauthenticated: the attacker only needs to entice a user who has legitimate access to the management interface to click a malicious link. Full exploitation occurs in the victim’s browser, not on the server, so confidentiality or integrity impact is confined to the client session.

Generated by OpenCVE AI on April 15, 2026 at 22:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco Unity Connection patch or update selected by the vendor that addresses the reflected XSS flaw.
  • Limit exposure of the web‑based management interface to approved networks or enforce strict authentication controls, such as multi‑factor authentication, so that only verified administrators can use it.
  • Deploy a web application firewall or configure browser‑side script‑blocking policies to detect and block reflected XSS payloads, ensuring input sanitization practices consistent with CWE‑79 best practices.

Generated by OpenCVE AI on April 15, 2026 at 22:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco unity Connection
Vendors & Products Cisco
Cisco unity Connection

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a reflected XSS attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Title Cisco Unity Connection Reflected Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Cisco Unity Connection
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-15T16:56:33.949Z

Reserved: 2025-10-08T11:59:15.356Z

Link: CVE-2026-20059

cve-icon Vulnrichment

Updated: 2026-04-15T16:56:12.389Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-15T17:17:01.060

Modified: 2026-04-17T15:09:46.880

Link: CVE-2026-20059

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:30:16Z

Weaknesses