We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20236

Cisco Webex App Client-Side Remote Code Execution Vulnerability



Description

A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.

Reserved 2024-10-10 | Published 2025-04-16 | Updated 2025-04-17 | Assigner cisco


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

Inclusion of Functionality from Untrusted Control Sphere

Product status

Default status
unknown

44.6
affected

44.6.0.29928
affected

44.6.0.30148
affected

44.7
affected

44.7.0.30141
affected

44.7.0.30285
affected

References

sec.cloudapps.cisco.com/...-sa-webex-app-client-rce-ufyMMYLC (cisco-sa-webex-app-client-rce-ufyMMYLC)

cve.org (CVE-2025-20236)

nvd.nist.gov (CVE-2025-20236)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20236

Support options

Helpdesk Chat, Email, Knowledgebase