We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20139



Description

A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.

Reserved 2024-10-10 | Published 2025-04-02 | Updated 2025-04-02 | Assigner cisco


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Incorrect Regular Expression

Product status

11.5(1)
affected

11.6(1)
affected

11.6(1)_ES2
affected

11.6(1)_ES3
affected

11.6(1)_ES4
affected

11.6(1)_ES5
affected

11.6(1)_ES6
affected

11.6(1)_ES10
affected

11.6(1)_ES11
affected

11.6(1)_ES7
affected

11.6(1)_ES8
affected

11.6(1)_ES9
affected

11.6(1)_ES9a
affected

11.6(1)_ES12
affected

11.6(1)_ES12_ET1
affected

12.0(1)
affected

12.0(1)_ES1
affected

12.0(1)_ES2
affected

12.0(1)_ES3
affected

12.0(1)_ES4
affected

12.0(1)_ES5
affected

12.0(1)_ES5a
affected

12.0(1)_ES6
affected

12.0(1)_ES6_ET1
affected

12.0(1)_ES6_ET2
affected

12.0(1)_ES6_ET3
affected

12.0(1)_ES7
affected

12.0(1)_ES7_ET1
affected

12.5(1)
affected

12.5(1)_ES1
affected

12.5(1)_ES2
affected

12.5(1)_ES3
affected

12.5(1)_ES3_ET1
affected

12.5(1)_ET1
affected

12.5(1)_ES4
affected

12.5(1)_ES3_ET2
affected

12.5(1)_ES4_ET1
affected

12.5(1)_ES5
affected

12.5(1)_ES5_ET1
affected

12.5(1)_ES6
affected

12.5(1)_ES7
affected

12.5(1)_ES8
affected

12.5(1)_ES8_ET1
affected

12.5(1)_ES3_ET3
affected

12.5(1)_ES5_ET2
affected

12.5(1)_ES6_ET1
affected

12.5(1)_ES4_ET2
affected

12.5(1)_ES7_ET1
affected

12.5(1)_ES9
affected

12.6(1)
affected

12.6(1)_ET1
affected

12.6(1)_ET2
affected

12.6(1)_ES1
affected

12.6(1)_ET3
affected

12.6(1)_ES1_ET1
affected

12.6(1)_ES2
affected

12.6(1)_ES3
affected

12.6(1)_ES4
affected

12.6(1)_ES4_ET1
affected

12.6(1)_ES5
affected

12.6(1)_ES5_ET1
affected

12.6(1)_ES5_ET2
affected

12.6(1)_ES6
affected

12.6(1)_ES6_ET1
affected

12.6(1)_ES6_ET2
affected

12.6(1)_ES7
affected

12.6(1)_ES8
affected

12.6(1)_ES4_ET2
affected

12.6(1)_ES3_ET3
affected

12.6(1)_ES2_ET5
affected

12.6(1)_ES1_ET2
affected

12.6(1)_ES8_ET1
affected

12.6(1)_ES7_ET1
affected

12.6(1)_ES6_ET3
affected

12.6(1)_ES5_ET3
affected

12.6(1)_ES8_ET2
affected

12.6(1)_ES9
affected

12.6(1)_ES9_ET1
affected

12.6(1)_ES9_ET2
affected

12.6(1)_ES9_ET3
affected

12.6_ES2_ET1
affected

12.6_ES2_ET2
affected

12.6_ES2_ET3
affected

12.6_ES2_ET4
affected

12.6_ES3_ET1
affected

12.6_ES3_ET2
affected

References

sec.cloudapps.cisco.com/...dvisory/cisco-sa-ece-dos-tC6m9GZ8 (cisco-sa-ece-dos-tC6m9GZ8)

cve.org (CVE-2025-20139)

nvd.nist.gov (CVE-2025-20139)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20139

Support options

Helpdesk Chat, Email, Knowledgebase