Cisco AsyncOS Secure Email XSS in Web UI
CVE-2025-20180 Published on February 5, 2025
Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.
Vulnerability Analysis
CVE-2025-20180 is exploitable with network access, requires user interaction and user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2025-20180 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2025-20180
Want to know whenever a new CVE is published for Cisco Asyncos? stack.watch will email you.
Affected Versions
Cisco Secure Email:- Version 14.0.0-698 is affected.
- Version 13.5.1-277 is affected.
- Version 13.0.0-392 is affected.
- Version 14.2.0-620 is affected.
- Version 13.0.5-007 is affected.
- Version 13.5.4-038 is affected.
- Version 14.2.1-020 is affected.
- Version 14.3.0-032 is affected.
- Version 15.0.0-104 is affected.
- Version 15.0.1-030 is affected.
- Version 15.5.0-048 is affected.
- Version 15.5.1-055 is affected.
- Version 15.5.2-018 is affected.
- Version 16.0.0-050 is affected.
- Version 15.0.3-002 is affected.
- Version 16.0.0-054 is affected.
- Version 13.6.2-023 is affected.
- Version 13.6.2-078 is affected.
- Version 13.0.0-249 is affected.
- Version 13.0.0-277 is affected.
- Version 13.8.1-052 is affected.
- Version 13.8.1-068 is affected.
- Version 13.8.1-074 is affected.
- Version 14.0.0-404 is affected.
- Version 12.8.1-002 is affected.
- Version 14.1.0-227 is affected.
- Version 13.6.1-201 is affected.
- Version 14.2.0-203 is affected.
- Version 14.2.0-212 is affected.
- Version 12.8.1-021 is affected.
- Version 13.8.1-108 is affected.
- Version 14.2.0-224 is affected.
- Version 14.3.0-120 is affected.
- Version 15.0.0-334 is affected.
- Version 15.5.1-024 is affected.
- Version 15.5.1-029 is affected.
- Version 15.5.2-005 is affected.
- Version 16.0.0-195 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.