Cisco SDWAN Manager Authenticated XSS in Web UI
CVE-2026-20108 Published on March 25, 2026
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of the web-based management interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Vulnerability Analysis
CVE-2026-20108 is exploitable with network access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2026-20108 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2026-20108
Want to know whenever a new CVE is published for Cisco Catalyst Sd Wan Manager? stack.watch will email you.
Affected Versions
Cisco Catalyst SD-WAN Manager:- Version 20.12.1 is affected.
- Version 20.12.1_LI_Images is affected.
- Version 20.12.2 is affected.
- Version 20.12.3 is affected.
- Version 20.12.3.1 is affected.
- Version 20.12.4 is affected.
- Version 20.12.4.1 is affected.
- Version 20.12.5 is affected.
- Version 20.12.5.1 is affected.
- Version 20.12.5.2 is affected.
- Version 20.12.6 is affected.
- Version 20.12.6.1 is affected.
- Version 20.12.5.3 is affected.
- Version 20.13.1 is affected.
- Version 20.14.1 is affected.
- Version 20.15.1 is affected.
- Version 20.15.2 is affected.
- Version 20.15.3 is affected.
- Version 20.15.3.1 is affected.
- Version 20.15.4 is affected.
- Version 20.15.4.1 is affected.
- Version 20.15.4.2 is affected.
- Version 20.16.1 is affected.
- Version 20.18.1 is affected.