Home

Description

A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of other users or affect quiz and poll results. Cisco has addressed this vulnerability in Cisco Slido and no customer action is needed. This vulnerability existed because of the presence of an insecure direct object reference. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by sending a crafted request to the vulnerable API endpoint. A successful exploit could have allowed the attacker to view the social profiles of other users or affect quiz and poll results.

PUBLISHED Reserved 2025-10-08 | Published 2026-05-06 | Updated 2026-05-06 | Assigner cisco




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

Authorization Bypass Through User-Controlled Key

Product status

39.10
affected

39.11
affected

39.6
affected

39.7
affected

39.7.4
affected

39.7.7
affected

39.8
affected

39.8.2
affected

39.8.3
affected

39.8.4
affected

39.9
affected

39.9.1
affected

40.1
affected

40.2
affected

40.4
affected

40.4.10
affected

40.6
affected

40.6.2
affected

42.10
affected

42.11
affected

42.6
affected

42.9
affected

42.12
affected

42.7
affected

43.1
affected

43.4
affected

43.4.2
affected

43.5.0
affected

43.4.1
affected

Any version
affected

References

sec.cloudapps.cisco.com/...sory/cisco-sa-slido-idor-CpsFmKxN (cisco-sa-slido-idor-CpsFmKxN)

cve.org (CVE-2026-20219)

nvd.nist.gov (CVE-2026-20219)

Download JSON