CVE-2026-20172

Published: Mag 06, 2026 Last Modified: Mag 06, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,3
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Agent.

This vulnerability is due to inadequate validation of file contents during file upload operations. An attacker could exploit this vulnerability by uploading a file that contains malicious scripts or HTML code, which the application could make available to other users to access. A successful exploit could allow the attacker to execute the contents of that file in the browser of a user and conduct browser-based attacks. 

646

Reliance on File Name or Extension of Externally-Supplied File

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Availability Access Control
Potential Impacts:
Read Application Data Dos: Crash, Exit, Or Restart Gain Privileges Or Assume Identity
Applicable Platforms
Technologies: Web Server
View CWE Details
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/c…