Description
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Published: 2026-04-01
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑Side XSS
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Cisco Integrated Management Controller web interface enables an authenticated, remote attacker with administrative rights to store malicious scripts that are displayed to other users. The stored cross‑site scripting can cause the victim’s browser to run arbitrary code or reveal sensitive browser‑based information. The vulnerability stems from insufficient input validation and is classified as CWE‑79. While it does not grant direct server‑side exploitation, it can enable session hijacking, credential theft, or other client‑side attacks.

Affected Systems

Affected products include Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software (UCSE). The data does not list specific version ranges, so all current releases of these Cisco IMC products remain potentially vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity. No EPSS score is provided, but the exploit requires authenticated administrative access and a user to click a crafted link, limiting attacker scope to internal privileged users. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known large‑scale exploitation yet. Users should promptly apply vendor updates and consider additional mitigations to reduce exposure.

Generated by OpenCVE AI on April 2, 2026 at 02:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco IMC security patch detailed in the Cisco Security Advisory.
  • If a patch is not yet available, restrict or disable the vulnerable management interface to prevent user interaction.
  • Segment the management network so that administrative accounts are isolated from general users.
  • Enable web filtering or content‑inspection on browsers accessing the interface to block malicious script execution.
  • Monitor access logs for suspicious activity related to the IMC interface.

Generated by OpenCVE AI on April 2, 2026 at 02:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System
Cisco unified Computing System Software
Vendors & Products Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System
Cisco unified Computing System Software

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Title Cisco Integrated Management Controller Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco Enterprise Nfv Infrastructure Software Unified Computing System Unified Computing System Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-22T19:10:11.956Z

Reserved: 2025-10-08T11:59:15.367Z

Link: CVE-2026-20087

cve-icon Vulnrichment

Updated: 2026-04-01T17:50:13.157Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:26.863

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20087

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:24Z

Weaknesses