5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.0005 Low
EPSS
Percentile
18.1%
A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[
{
"vendor": "Cisco",
"product": "Cisco Webex Meetings",
"versions": [
{
"version": "39.10",
"status": "affected"
},
{
"version": "39.11",
"status": "affected"
},
{
"version": "39.6",
"status": "affected"
},
{
"version": "39.7",
"status": "affected"
},
{
"version": "39.7.4",
"status": "affected"
},
{
"version": "39.7.7",
"status": "affected"
},
{
"version": "39.8",
"status": "affected"
},
{
"version": "39.8.2",
"status": "affected"
},
{
"version": "39.8.3",
"status": "affected"
},
{
"version": "39.8.4",
"status": "affected"
},
{
"version": "39.9",
"status": "affected"
},
{
"version": "39.9.1",
"status": "affected"
},
{
"version": "40.1",
"status": "affected"
},
{
"version": "40.2",
"status": "affected"
},
{
"version": "40.4",
"status": "affected"
},
{
"version": "40.4.10",
"status": "affected"
},
{
"version": "40.6",
"status": "affected"
},
{
"version": "40.6.2",
"status": "affected"
},
{
"version": "42.10",
"status": "affected"
},
{
"version": "42.11",
"status": "affected"
},
{
"version": "42.6",
"status": "affected"
},
{
"version": "42.9",
"status": "affected"
},
{
"version": "42.12",
"status": "affected"
},
{
"version": "42.8",
"status": "affected"
},
{
"version": "42.7",
"status": "affected"
},
{
"version": "43.2",
"status": "affected"
},
{
"version": "43.1",
"status": "affected"
},
{
"version": "43.3",
"status": "affected"
},
{
"version": "43.4",
"status": "affected"
},
{
"version": "43.4.2",
"status": "affected"
},
{
"version": "43.5.0",
"status": "affected"
},
{
"version": "43.4.1",
"status": "affected"
}
]
}
]