Description
A vulnerability in the web-based management interface of Cisco IMC could allow an unauthenticated, remote attacker to conduct a reflected XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Published: 2026-04-01
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Browser-based Script Execution via Reflected XSS
Action: Patch
AI Analysis

Impact

The CVE describes a reflected cross‑site scripting flaw in the Cisco Integrated Management Controller web interface. An unauthenticated attacker can convince a user to click a crafted URL, causing the browser to execute arbitrary JavaScript. The result can be theft of session cookies, privilege escalation within the web application, or other malicious actions performed with the user’s credentials. This vulnerability arises from insufficient input validation, classifying it as a standard reflected XSS weakness (CWE‑79).

Affected Systems

The flaw affects Cisco’s Enterprise NFV Infrastructure Software, the standalone Cisco Unified Computing System, and the Cisco Unified Computing System E‑Series Software. No specific version numbers are supplied in the advisory, so all current releases should be examined for the presence of the issue.

Risk and Exploitability

With a CVSS score of 6.1 the risk is moderate. The exploit requires only a malicious link delivered to a user of the web console; the attacker does not need authentication. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalogue, indicating no public exploitation reports yet. Nonetheless, any user who approves the crafted link could lose control of the console session or expose sensitive information.

Generated by OpenCVE AI on April 2, 2026 at 02:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Cisco advisory for available patches or firmware updates.
  • Download and apply the latest Cisco IMC patch or update the affected firmware.
  • If no patch is available, restrict or isolate the CIMC web interface behind a firewall or VPN to limit exposure.
  • Educate users to avoid clicking suspicious links presented in the management console.

Generated by OpenCVE AI on April 2, 2026 at 02:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System
Cisco unified Computing System Software
Vendors & Products Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System
Cisco unified Computing System Software

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IMC could allow an unauthenticated, remote attacker to conduct a reflected XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Title Cisco Integrated Management Controller Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco Enterprise Nfv Infrastructure Software Unified Computing System Unified Computing System Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-22T19:10:14.472Z

Reserved: 2025-10-08T11:59:15.367Z

Link: CVE-2026-20085

cve-icon Vulnrichment

Updated: 2026-04-01T18:14:23.656Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:26.337

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:35Z

Weaknesses