{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-20116","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.210Z","datePublished":"2025-02-26T16:11:17.385Z","dateUpdated":"2025-02-27T15:10:56.631Z"},"containers":{"cna":{"title":"Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5","name":"cisco-sa-apic-multi-vulns-9ummtg5"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."}],"source":{"advisory":"cisco-sa-apic-multi-vulns-9ummtg5","discovery":"EXTERNAL","defects":["CSCwk18863"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"cwe","cweId":"CWE-79"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Application Policy Infrastructure Controller (APIC)","versions":[{"version":"3.2(8d)","status":"affected"},{"version":"3.2(1m)","status":"affected"},{"version":"3.2(5e)","status":"affected"},{"version":"4.1(2m)","status":"affected"},{"version":"3.2(41d)","status":"affected"},{"version":"3.2(3s)","status":"affected"},{"version":"4.0(3c)","status":"affected"},{"version":"4.1(1k)","status":"affected"},{"version":"3.2(4d)","status":"affected"},{"version":"4.2(2e)","status":"affected"},{"version":"4.2(3j)","status":"affected"},{"version":"4.2(3n)","status":"affected"},{"version":"4.0(1h)","status":"affected"},{"version":"4.1(1l)","status":"affected"},{"version":"3.2(9f)","status":"affected"},{"version":"4.2(3l)","status":"affected"},{"version":"4.2(2g)","status":"affected"},{"version":"3.2(7k)","status":"affected"},{"version":"3.2(9b)","status":"affected"},{"version":"3.2(3j)","status":"affected"},{"version":"4.1(2u)","status":"affected"},{"version":"4.2(1l)","status":"affected"},{"version":"4.1(1a)","status":"affected"},{"version":"4.0(3d)","status":"affected"},{"version":"3.2(4e)","status":"affected"},{"version":"4.1(1i)","status":"affected"},{"version":"3.2(5f)","status":"affected"},{"version":"3.2(1l)","status":"affected"},{"version":"4.2(1i)","status":"affected"},{"version":"4.1(2o)","status":"affected"},{"version":"4.2(1g)","status":"affected"},{"version":"4.1(2g)","status":"affected"},{"version":"4.2(2f)","status":"affected"},{"version":"3.2(6i)","status":"affected"},{"version":"3.2(3i)","status":"affected"},{"version":"3.2(3n)","status":"affected"},{"version":"4.1(2x)","status":"affected"},{"version":"3.2(5d)","status":"affected"},{"version":"4.2(3q)","status":"affected"},{"version":"4.1(1j)","status":"affected"},{"version":"4.1(2w)","status":"affected"},{"version":"3.2(2o)","status":"affected"},{"version":"3.2(3r)","status":"affected"},{"version":"4.0(2c)","status":"affected"},{"version":"4.1(2s)","status":"affected"},{"version":"3.2(7f)","status":"affected"},{"version":"3.2(3o)","status":"affected"},{"version":"3.2(2l)","status":"affected"},{"version":"4.2(1j)","status":"affected"},{"version":"4.2(4i)","status":"affected"},{"version":"3.2(9h)","status":"affected"},{"version":"5.0(1k)","status":"affected"},{"version":"4.2(4k)","status":"affected"},{"version":"5.0(1l)","status":"affected"},{"version":"5.0(2e)","status":"affected"},{"version":"4.2(4o)","status":"affected"},{"version":"4.2(4p)","status":"affected"},{"version":"5.0(2h)","status":"affected"},{"version":"4.2(5k)","status":"affected"},{"version":"4.2(5l)","status":"affected"},{"version":"4.2(5n)","status":"affected"},{"version":"5.1(1h)","status":"affected"},{"version":"4.2(6d)","status":"affected"},{"version":"5.1(2e)","status":"affected"},{"version":"4.2(6g)","status":"affected"},{"version":"4.2(6h)","status":"affected"},{"version":"5.1(3e)","status":"affected"},{"version":"3.2(10e)","status":"affected"},{"version":"4.2(6l)","status":"affected"},{"version":"4.2(7f)","status":"affected"},{"version":"5.1(4c)","status":"affected"},{"version":"4.2(6o)","status":"affected"},{"version":"5.2(1g)","status":"affected"},{"version":"5.2(2e)","status":"affected"},{"version":"4.2(7l)","status":"affected"},{"version":"3.2(10f)","status":"affected"},{"version":"5.2(2f)","status":"affected"},{"version":"5.2(2g)","status":"affected"},{"version":"4.2(7q)","status":"affected"},{"version":"5.2(2h)","status":"affected"},{"version":"5.2(3f)","status":"affected"},{"version":"5.2(3e)","status":"affected"},{"version":"5.2(3g)","status":"affected"},{"version":"4.2(7r)","status":"affected"},{"version":"4.2(7s)","status":"affected"},{"version":"5.2(4d)","status":"affected"},{"version":"5.2(4e)","status":"affected"},{"version":"4.2(7t)","status":"affected"},{"version":"5.2(5d)","status":"affected"},{"version":"3.2(10g)","status":"affected"},{"version":"5.2(5c)","status":"affected"},{"version":"6.0(1g)","status":"affected"},{"version":"4.2(7u)","status":"affected"},{"version":"5.2(5e)","status":"affected"},{"version":"5.2(4f)","status":"affected"},{"version":"5.2(6e)","status":"affected"},{"version":"6.0(1j)","status":"affected"},{"version":"5.2(6g)","status":"affected"},{"version":"5.2(7f)","status":"affected"},{"version":"4.2(7v)","status":"affected"},{"version":"5.2(7g)","status":"affected"},{"version":"6.0(2h)","status":"affected"},{"version":"4.2(7w)","status":"affected"},{"version":"5.2(6h)","status":"affected"},{"version":"5.2(4h)","status":"affected"},{"version":"5.2(8d)","status":"affected"},{"version":"6.0(2j)","status":"affected"},{"version":"5.2(8e)","status":"affected"},{"version":"6.0(3d)","status":"affected"},{"version":"6.0(3e)","status":"affected"},{"version":"5.2(8f)","status":"affected"},{"version":"5.2(8g)","status":"affected"},{"version":"5.3(1d)","status":"affected"},{"version":"5.2(8h)","status":"affected"},{"version":"6.0(4c)","status":"affected"},{"version":"5.3(2a)","status":"affected"},{"version":"5.2(8i)","status":"affected"},{"version":"6.0(5h)","status":"affected"},{"version":"5.3(2b)","status":"affected"},{"version":"6.0(3g)","status":"affected"},{"version":"6.0(5j)","status":"affected"},{"version":"5.3(2c)","status":"affected"},{"version":"6.0(6c)","status":"affected"},{"version":"6.1(1f)","status":"affected"},{"version":"6.0(7e)","status":"affected"},{"version":"5.3(2d)","status":"affected"},{"version":"6.0(8d)","status":"affected"},{"version":"5.3(2e)","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2025-02-26T16:11:17.385Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-26T16:49:28.397648Z","id":"CVE-2025-20116","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-27T15:10:56.631Z"}}]}}