CVE-2022-20631

A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious script code in a chat window. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*

History

31 Jul 2025, 15:07

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*
First Time Cisco
Cisco enterprise Chat And Email
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR - Vendor Advisory

Information

Published : 2024-11-15 16:15

Updated : 2025-07-31 15:07


NVD link : CVE-2022-20631

Mitre link : CVE-2022-20631

CVE.ORG link : CVE-2022-20631


JSON object : View

Products Affected

cisco

  • enterprise_chat_and_email
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')