Description
A vulnerability in the Desktop Agent functionality of Cisco Webex Contact Center could have allowed an unauthenticated, remote attacker to conduct cross-site scripting attacks. Cisco has addressed this vulnerability in the Cisco Webex Contact Center service, and no customer action is needed.

This vulnerability existed because HTML and script content was not properly handled. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by persuading a user to follow a malicious link. A successful exploit could have allowed the attacker to steal sensitive information from the browser, including authentication and session information.
Published: 2026-04-15
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: Unauthenticated cross‑site scripting that can steal browser session data
Action: Monitor
AI Analysis

Impact

A cross‑site scripting flaw exists in the Desktop Agent component of Cisco Webex Contact Center. The attacker can embed malicious HTML or script that, when a user follows a crafted link, executes in the victim’s browser. The impact is the theft of sensitive information stored in the browser, including authentication tokens and session data, which can lead to unauthorized access to the Webex environment.

Affected Systems

The vulnerability affects the Cisco Webex Contact Center product line, specifically the Desktop Agent functionality. No specific version range is provided, so any installation of the Desktop Agent that has not yet incorporated the vendor’s fix may be impacted.

Risk and Exploitability

The CVSS base score is 6.1, indicating moderate severity. No EPSS score is available and the issue is not listed in CISA’s KEV catalog. Exploitation requires an unauthenticated remote attacker to persuade a user to click a malicious link, meaning it is contingent on user interaction. The risk remains moderate, but as the vendor has issued an internal fix and no customer action is required, the immediate likelihood of exploitation is reduced if the product is current.

Generated by OpenCVE AI on April 15, 2026 at 19:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Ensure Cisco Webex Contact Center is running the latest software version that includes the internal fix for this issue.
  • If the Desktop Agent feature is not required, disable it to remove the attack surface.
  • Educate users about the risks of following unsolicited links and conduct regular phishing awareness training.

Generated by OpenCVE AI on April 15, 2026 at 19:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco cisco Webex Contact Center
Vendors & Products Cisco
Cisco cisco Webex Contact Center

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Title Unauthenticated XSS in Cisco Webex Contact Center Desktop Agent

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Desktop Agent functionality of Cisco Webex Contact Center could have allowed an unauthenticated, remote attacker to conduct cross-site scripting attacks. Cisco has addressed this vulnerability in the Cisco Webex Contact Center service, and no customer action is needed. This vulnerability existed because HTML and script content was not properly handled. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by persuading a user to follow a malicious link. A successful exploit could have allowed the attacker to steal sensitive information from the browser, including authentication and session information.
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Cisco Cisco Webex Contact Center
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-15T16:56:34.563Z

Reserved: 2025-10-08T11:59:15.391Z

Link: CVE-2026-20170

cve-icon Vulnrichment

Updated: 2026-04-15T16:56:18.655Z

cve-icon NVD

Status : Received

Published: 2026-04-15T17:17:03.297

Modified: 2026-04-15T17:17:03.297

Link: CVE-2026-20170

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:02:22Z

Weaknesses