CVE-2026-20172
MEDIUM
4,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
Description
AI Translation Available
A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Agent.
This vulnerability is due to inadequate validation of file contents during file upload operations. An attacker could exploit this vulnerability by uploading a file that contains malicious scripts or HTML code, which the application could make available to other users to access. A successful exploit could allow the attacker to execute the contents of that file in the browser of a user and conduct browser-based attacks.
646
Reliance on File Name or Extension of Externally-Supplied File
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Availability
Access Control
Potential Impacts:
Read Application Data
Dos: Crash, Exit, Or Restart
Gain Privileges Or Assume Identity
Applicable Platforms
Technologies:
Web Server
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/c…