Home

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document. This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only).

PUBLISHED Reserved 2024-10-10 | Published 2025-08-14 | Updated 2025-08-14 | Assigner cisco




HIGH: 8.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

Problem types

Improper Input Validation

Product status

Default status
unknown

7.2.4
affected

7.0.6
affected

7.2.4.1
affected

7.2.5
affected

7.4.0
affected

7.0.6.1
affected

7.2.5.1
affected

7.4.1
affected

7.2.6
affected

7.4.1.1
affected

7.0.6.2
affected

7.2.7
affected

7.2.5.2
affected

7.2.8
affected

7.4.2
affected

7.2.8.1
affected

7.0.6.3
affected

7.4.2.1
affected

7.2.9
affected

References

sec.cloudapps.cisco.com/...ry/cisco-sa-fmc-html-inj-MqjrZrny (cisco-sa-fmc-html-inj-MqjrZrny)

cve.org (CVE-2025-20148)

nvd.nist.gov (CVE-2025-20148)

Download JSON