Description
A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.

This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Published: 2026-03-11
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in the web‑based management interface of Cisco Unified Contact Center Express. The interface does not sufficiently validate user‑supplied input, allowing an unauthenticated, remote attacker to inject malicious code into specific pages. A successful exploit could enable the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser‑based information, as described in the advisory.

Affected Systems

Cisco Unified Contact Center Express is affected. The advisory does not specify version numbers, so all deployed instances should be considered vulnerable unless verified otherwise.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. The EPSS score is below 1 %, implying low likelihood of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers can launch the exploit remotely without authentication, using the publicly accessible management interface.

Generated by OpenCVE AI on March 17, 2026 at 15:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and apply the Cisco patch for Unified Contact Center Express published in the advisory at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-xss-MrNAH5Jh.
  • Verify that the patch has been successfully applied and that the web interface no longer accepts suspicious input.

Generated by OpenCVE AI on March 17, 2026 at 15:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco unified Contact Center Express
Vendors & Products Cisco
Cisco unified Contact Center Express

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Title Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Cisco Unified Contact Center Express
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-11T17:20:21.169Z

Reserved: 2025-10-08T11:59:15.376Z

Link: CVE-2026-20117

cve-icon Vulnrichment

Updated: 2026-03-11T17:14:19.821Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T17:16:55.973

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-20117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:28Z

Weaknesses