Description
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Published: 2026-04-01
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting in Cisco IMC web interface allows authenticated administrators to inject and execute arbitrary JavaScript in users' browsers
Action: Patch ASAP
AI Analysis

Impact

The vulnerability resides in the web‑based management interface of Cisco Integrated Management Controller (IMC) and permits a stored cross‑site scripting (XSS) attack. Due to insufficient input validation, an attacker who successfully logs in with administrative rights may store malicious script code. When an interface user opens a crafted link, the script runs in that user’s browser, potentially exposing sensitive information or enabling further exploitation within the browser context.

Affected Systems

Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software (UCSE) are affected. Version specifics are not disclosed, so all current releases of these products could remain vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 4.8 reflects a moderate severity. EPSS data is unavailable and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a remote authenticated attacker who holds administrative privileges. Once logged in, the attacker can entice a user to click a malicious link; following the click, arbitrary JavaScript runs in the user’s browser. This scenario requires the attacker to be already authenticated, but does not restrict the method of initial access beyond legitimate administrative credentials. The overall risk is elevated for environments where the IMC interface is exposed to less trusted users or over untrusted networks.

Generated by OpenCVE AI on April 2, 2026 at 03:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether Cisco has released a patch or updated firmware and apply it immediately
  • Restrict access to the IMC web interface to trusted administrators only and enforce strong authentication measures
  • Educate users about the risks of clicking unknown URLs while using the management console and advise them to report suspicious links
  • Implement web application firewalls or content security policies to detect and block XSS attempts until a formal fix is available

Generated by OpenCVE AI on April 2, 2026 at 03:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System Manager
Cisco unified Computing System Software
Vendors & Products Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System Manager
Cisco unified Computing System Software

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Title Cisco Integrated Management Controller Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco Enterprise Nfv Infrastructure Software Unified Computing System Manager Unified Computing System Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-22T19:09:52.272Z

Reserved: 2025-10-08T11:59:15.368Z

Link: CVE-2026-20090

cve-icon Vulnrichment

Updated: 2026-04-01T17:44:18.495Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:28.503

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20090

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:13Z

Weaknesses