Cisco Desk/Video Phone XSS via Unauthenticated Web UI
CVE-2025-20351 Published on October 15, 2025
Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Firmware Cross-Site Scripting Vulnerability
A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 running Cisco SIP Software could allow an unauthenticated, remote attacker to conduct XSS attacks against a user of the web UI.
This vulnerability exists because the web UI of an affected device does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Note: To exploit this vulnerability, the phone must be registered to Cisco Unified Communications Manager and have Web Access enabled. Web Access is disabled by default.
Vulnerability Analysis
CVE-2025-20351 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2025-20351 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2025-20351
Want to know whenever a new CVE is published for Cisco Sip? stack.watch will email you.
Affected Versions
Cisco Session Initiation Protocol (SIP) Software:- Version 12.1(1)SR1 is affected.
- Version 11.5(1) is affected.
- Version 10.3(2) is affected.
- Version 10.2(2) is affected.
- Version 10.3(1) is affected.
- Version 10.3(1)SR4 is affected.
- Version 11.0(1) is affected.
- Version 10.4(1)SR2 3rd Party is affected.
- Version 11.7(1) is affected.
- Version 12.1(1) is affected.
- Version 11.0(0.7) MPP is affected.
- Version 9.3(4) 3rd Party is affected.
- Version 12.5(1)SR2 is affected.
- Version 10.2(1)SR1 is affected.
- Version 9.3(4)SR3 3rd Party is affected.
- Version 10.2(1) is affected.
- Version 12.5(1) is affected.
- Version 10.3(1)SR2 is affected.
- Version 11-0-1MSR1-1 is affected.
- Version 10.4(1) 3rd Party is affected.
- Version 12.5(1)SR1 is affected.
- Version 11.5(1)SR1 is affected.
- Version 10.1(1)SR2 is affected.
- Version 12.0(1)SR2 is affected.
- Version 12.6(1) is affected.
- Version 10.3(1.11) 3rd Party is affected.
- Version 12.0(1) is affected.
- Version 12.0(1)SR1 is affected.
- Version 9.3(3) is affected.
- Version 12.5(1)SR3 is affected.
- Version 10.3(1)SR4b is affected.
- Version 9.3(4)SR1 3rd Party is affected.
- Version 10.3(1)SR5 is affected.
- Version 10.1(1.9) is affected.
- Version 10.3(1.9) 3rd Party is affected.
- Version 9.3(4)SR2 3rd Party is affected.
- Version 10.3(1)SR1 is affected.
- Version 10.3(1)SR3 is affected.
- Version 10.1(1)SR1 is affected.
- Version 12.0(1)SR3 is affected.
- Version 12.6(1)SR1 is affected.
- Version 12.7(1) is affected.
- Version 10.3(1)SR6 is affected.
- Version 12.8(1) is affected.
- Version 12.7(1)SR1 is affected.
- Version 11.0(2)SR1 is affected.
- Version 11.0(4) is affected.
- Version 11.0(2) is affected.
- Version 11.0(4)SR3 is affected.
- Version 11.0(5) is affected.
- Version 11.0(3)SR2 is affected.
- Version 11.0(3)SR4 is affected.
- Version 11.0(3)SR3 is affected.
- Version 11.0(2)SR2 is affected.
- Version 11.0(4)SR1 is affected.
- Version 11.0(5)SR3 is affected.
- Version 11.0(3) is affected.
- Version 11.0(5)SR2 is affected.
- Version 11.0(3)SR6 is affected.
- Version 11.0(5)SR1 is affected.
- Version 11.0(4)SR2 is affected.
- Version 11.0(3)SR1 is affected.
- Version 11.0(3)SR5 is affected.
- Version 11.0(6) is affected.
- Version 12.8(1)SR1 is affected.
- Version 12.8(1)SR2 is affected.
- Version 14.0(1) is affected.
- Version 14.0(1)SR1 is affected.
- Version 11.0(6)SR1 is affected.
- Version 10.3(1)SR7 is affected.
- Version 14.0(1)SR2 is affected.
- Version 14.1(1) is affected.
- Version 14.0(1)SR3 is affected.
- Version 11.0(6)SR2 is affected.
- Version 14.1(1)SR1 is affected.
- Version 14.1(1)SR2 is affected.
- Version 11.0(6)SR4 is affected.
- Version 14.2(1) is affected.
- Version 14.2(1)SR1 is affected.
- Version 11.0(6)SR5 is affected.
- Version 14.1(1)SR3 is affected.
- Version 14.2(1)SR2 is affected.
- Version 3.1(1) is affected.
- Version 3.0(1) is affected.
- Version 2.3(1) is affected.
- Version 2.3(1)SR1 is affected.
- Version 2.2(1) is affected.
- Version 2.1(1) is affected.
- Version 2.0(1) is affected.
- Version 14.2(1)SR3 is affected.
- Version 3.1(1)SR1 is affected.
- Version 14.3(1) is affected.
- Version 3.2(1) is affected.
- Version 14.3(1)SR1 is affected.
- Version 14.2(1)SR4 is affected.
- Version 11.0(6)SR6 is affected.
- Version 14.3(1)SR2 is affected.
- Version 14.3(1)SR3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.