Description
A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Agent.

This vulnerability is due to inadequate validation of file contents during file upload operations. An attacker could exploit this vulnerability by uploading a file that contains malicious scripts or HTML code, which the application could make available to other users to access. A successful exploit could allow the attacker to execute the contents of that file in the browser of a user and conduct browser-based attacks. 
Published: 2026-05-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability arises from insufficient validation of file contents during upload in the Lite Agent component of Cisco Enterprise Chat and Email. An authenticated attacker with Agent privileges can upload a file containing malicious scripts or HTML. The application then makes this file available to other users, and when viewed, the file’s contents execute in the victim’s browser, enabling attacker‑controlled browser-based attacks.

Affected Systems

The affected product is Cisco Enterprise Chat and Email (ECE), specifically the Lite Agent feature. Users with at least the Agent role are required for exploitation. No specific version range is disclosed in the advisory.

Risk and Exploitability

The advisory assigns a CVSS score of 4.3, indicating a low‑to‑medium severity. Exploitation requires valid credentials and user interaction to open the uploaded file, reducing the likelihood of widespread automated attacks. However, because the payload runs in the victim’s browser, the attack can lead to data theft, session hijacking, or further network compromise. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation so far.

Generated by OpenCVE AI on May 6, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Cisco Enterprise Chat and Email to the latest release that includes the fixed file‑upload validation.
  • If a patch is not immediately available, restrict the file types accepted by the Lite Agent upload interface to only those required for normal operation and disable execution of any uploaded content by configuring the web server or CMS to serve uploads as static files.
  • Audit existing uploads to remove any files containing executable scripts or HTML and implement content scanning or sandboxing for future uploads to ensure that only safe content is delivered to users.

Generated by OpenCVE AI on May 6, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco enterprise Chat And Email
Vendors & Products Cisco
Cisco enterprise Chat And Email

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Agent. This vulnerability is due to inadequate validation of file contents during file upload operations. An attacker could exploit this vulnerability by uploading a file that contains malicious scripts or HTML code, which the application could make available to other users to access. A successful exploit could allow the attacker to execute the contents of that file in the browser of a user and conduct browser-based attacks.&nbsp;
Title Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability
Weaknesses CWE-646
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Cisco Enterprise Chat And Email
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-06T17:46:04.178Z

Reserved: 2025-10-08T11:59:15.391Z

Link: CVE-2026-20172

cve-icon Vulnrichment

Updated: 2026-05-06T17:45:59.805Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T17:16:20.880

Modified: 2026-05-06T18:59:53.230

Link: CVE-2026-20172

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T20:15:15Z

Weaknesses