Cisco UIC API Horizontal Privilege Escalation via IDOR
CVE-2025-20114 Published on May 21, 2025
Cisco Unified Intelligence Center Insecure Direct Object Reference Vulnerability
A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system.
This vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack. A successful exploit could allow the attacker to access specific data that is associated with different users on the affected system.
Vulnerability Analysis
CVE-2025-20114 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
What is an Insecure Direct Object Reference / IDOR Vulnerability?
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
CVE-2025-20114 has been classified to as an Insecure Direct Object Reference / IDOR vulnerability or weakness.
Products Associated with CVE-2025-20114
stack.watch emails you whenever new vulnerabilities are published in Cisco Unified Intelligence Center or Cisco Unified Contact Center Express. Just hit a watch button to start following.
Affected Versions
Cisco Unified Contact Center Express:- Version 10.6(1) is affected.
- Version 10.5(1)SU1 is affected.
- Version 10.6(1)SU3 is affected.
- Version 12.0(1) is affected.
- Version 10.0(1)SU1 is affected.
- Version 10.6(1)SU1 is affected.
- Version 11.0(1)SU1 is affected.
- Version 11.5(1)SU1 is affected.
- Version 10.5(1) is affected.
- Version 11.6(1) is affected.
- Version 11.6(2) is affected.
- Version 12.5(1) is affected.
- Version 12.5(1)SU1 is affected.
- Version 12.5(1)SU2 is affected.
- Version 12.5(1)SU3 is affected.
- Version 12.5(1)_SU03_ES01 is affected.
- Version 12.5(1)_SU03_ES02 is affected.
- Version 12.5(1)_SU02_ES03 is affected.
- Version 12.5(1)_SU02_ES04 is affected.
- Version 12.5(1)_SU02_ES02 is affected.
- Version 12.5(1)_SU01_ES02 is affected.
- Version 12.5(1)_SU01_ES03 is affected.
- Version 12.5(1)_SU02_ES01 is affected.
- Version 11.6(2)ES07 is affected.
- Version 11.6(2)ES08 is affected.
- Version 12.5(1)_SU01_ES01 is affected.
- Version 12.0(1)ES04 is affected.
- Version 12.5(1)ES02 is affected.
- Version 12.5(1)ES03 is affected.
- Version 11.6(2)ES06 is affected.
- Version 12.5(1)ES01 is affected.
- Version 12.0(1)ES03 is affected.
- Version 12.0(1)ES01 is affected.
- Version 11.6(2)ES05 is affected.
- Version 12.0(1)ES02 is affected.
- Version 11.6(2)ES04 is affected.
- Version 11.6(2)ES03 is affected.
- Version 11.6(2)ES02 is affected.
- Version 11.6(2)ES01 is affected.
- Version 10.6(1)SU3ES03 is affected.
- Version 11.0(1)SU1ES03 is affected.
- Version 10.6(1)SU3ES01 is affected.
- Version 10.5(1)SU1ES10 is affected.
- Version 10.0(1)SU1ES04 is affected.
- Version 11.5(1)SU1ES03 is affected.
- Version 11.6(1)ES02 is affected.
- Version 11.5(1)ES01 is affected.
- Version 9.0(2)SU3ES04 is affected.
- Version 10.6(1)SU2 is affected.
- Version 10.6(1)SU2ES04 is affected.
- Version 11.6(1)ES01 is affected.
- Version 10.6(1)SU3ES02 is affected.
- Version 11.5(1)SU1ES02 is affected.
- Version 11.5(1)SU1ES01 is affected.
- Version 8.5(1) is affected.
- Version 11.0(1)SU1ES02 is affected.
- Version 12.5(1)_SU03_ES03 is affected.
- Version 12.5(1)_SU03_ES04 is affected.
- Version 12.5(1)_SU03_ES05 is affected.
- Version 12.5(1)_SU03_ES06 is affected.
- Version 11.6(1) is affected.
- Version 10.5(1) is affected.
- Version 11.0(1) is affected.
- Version 11.5(1) is affected.
- Version 12.0(1) is affected.
- Version 12.5(1) is affected.
- Version 11.0(2) is affected.
- Version 12.6(1) is affected.
- Version 12.5(1)SU is affected.
- Version 12.6(1)_ET is affected.
- Version 12.6(1)_ES05_ET is affected.
- Version 11.0(3) is affected.
- Version 12.6(2) is affected.
- Version 12.6(2)_504_Issue_ET is affected.
- Version 12.6.1_ExcelIssue_ET is affected.
- Version 12.6(2)_Permalink_ET is affected.
- Version 12.6.2_CSCwk19536_ET is affected.
- Version 12.6.2_CSCwm96922_ET is affected.
- Version 12.6.2_Amq_OOS_ET is affected.
- Version 12.5(2)ET_CSCwi79933 is affected.
- Version 12.6(2)_ET is affected.
- Version 12.6.2_CSCwn48501_ET is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.