Home

Description

Multiple vulnerabilities in the web-based management interface of Cisco Packaged Contact Center Enterprise (Packaged CCE) and Cisco Unified Contact Center Enterprise (Unified CCE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.  These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.

PUBLISHED Reserved 2025-10-08 | Published 2026-01-21 | Updated 2026-01-21 | Assigner cisco




MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unknown

12.5(1)
affected

11.0(1)
affected

12.0(1)
affected

11.0(2)
affected

11.5(1)
affected

10.5(1)
affected

10.5(2)
affected

11.6(2)
affected

10.5(1)_ES7
affected

11.6(1)
affected

10.5(2)_ES8
affected

12.6(1)
affected

12.5(2)
affected

12.6(2)
affected

15.0(1)
affected

Default status
unknown

12.6(1)ES3
affected

12.6(1)ES1
affected

12.6(1)
affected

12.6(1)ES2
affected

12.6(1)SecurityPatch
affected

12.5(1)ES1
affected

12.5(1)
affected

12.6(1)ES4
affected

11.0(1)
affected

10.5(1)
affected

12.0(1)
affected

10.5
affected

11.0
affected

11.5
affected

12.6(2)
affected

12.6(2)ES1
affected

12.6(2)ES2
affected

15.0(1)
affected

12.6(2)ES3
affected

15.0(1)ET01
affected

15.0(1)_SP1
affected

15.0(1)ES202508
affected

References

sec.cloudapps.cisco.com/...y/cisco-sa-ucce-pcce-xss-2JVyg3uD (cisco-sa-ucce-pcce-xss-2JVyg3uD)

cve.org (CVE-2026-20055)

nvd.nist.gov (CVE-2026-20055)

Download JSON