Cisco Finesse UI XSS in WebUI Allows Remote Attacker Exec
CVE-2026-20116 Published on March 11, 2026
Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities
A vulnerability in the web-based management interface of Cisco Finesse, Cisco Packaged Contact Center Enterprise (Packaged CCE), Cisco Unified Contact Center Enterprise (Unified CCE), Cisco Unified Contact Center Express (Unified CCX), and Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Vulnerability Analysis
CVE-2026-20116 is exploitable with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2026-20116 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2026-20116
Want to know whenever a new CVE is published for Cisco Unified Contact Center Express? stack.watch will email you.
Affected Versions
Cisco Unified Contact Center Express:- Version 10.5(1)SU1 is affected.
- Version 10.6(1) is affected.
- Version 11.6(1) is affected.
- Version 10.6(1)SU1 is affected.
- Version 10.6(1)SU3 is affected.
- Version 11.6(2) is affected.
- Version 12.0(1) is affected.
- Version 11.0(1)SU1 is affected.
- Version 11.5(1)SU1 is affected.
- Version 10.5(1) is affected.
- Version 12.5(1) is affected.
- Version 12.5(1)SU1 is affected.
- Version 12.5(1)SU2 is affected.
- Version 12.5(1)SU3 is affected.
- Version 12.5(1)_SU03_ES01 is affected.
- Version 12.5(1)_SU03_ES02 is affected.
- Version 12.5(1)_SU02_ES03 is affected.
- Version 12.5(1)_SU02_ES04 is affected.
- Version 12.5(1)_SU02_ES02 is affected.
- Version 12.5(1)_SU01_ES02 is affected.
- Version 12.5(1)_SU01_ES03 is affected.
- Version 12.5(1)_SU02_ES01 is affected.
- Version 11.6(2)ES07 is affected.
- Version 11.6(2)ES08 is affected.
- Version 12.5(1)_SU01_ES01 is affected.
- Version 12.0(1)ES04 is affected.
- Version 12.5(1)ES02 is affected.
- Version 12.5(1)ES03 is affected.
- Version 11.6(2)ES06 is affected.
- Version 12.5(1)ES01 is affected.
- Version 12.0(1)ES03 is affected.
- Version 12.0(1)ES01 is affected.
- Version 11.6(2)ES05 is affected.
- Version 12.0(1)ES02 is affected.
- Version 11.6(2)ES04 is affected.
- Version 11.6(2)ES03 is affected.
- Version 11.6(2)ES02 is affected.
- Version 11.6(2)ES01 is affected.
- Version 10.6(1)SU3ES03 is affected.
- Version 11.0(1)SU1ES03 is affected.
- Version 10.6(1)SU3ES01 is affected.
- Version 10.5(1)SU1ES10 is affected.
- Version 11.5(1)SU1ES03 is affected.
- Version 11.6(1)ES02 is affected.
- Version 11.5(1)ES01 is affected.
- Version 10.6(1)SU2 is affected.
- Version 10.6(1)SU2ES04 is affected.
- Version 11.6(1)ES01 is affected.
- Version 10.6(1)SU3ES02 is affected.
- Version 11.5(1)SU1ES02 is affected.
- Version 11.5(1)SU1ES01 is affected.
- Version 11.0(1)SU1ES02 is affected.
- Version 12.5(1)_SU03_ES03 is affected.
- Version 12.5(1)_SU03_ES04 is affected.
- Version 12.5(1)_SU03_ES05 is affected.
- Version UCCX 15.0.1 is affected.
- Version 12.5(1)_SU03_ES06 is affected.
- Version 12.5(1)_SU03_ES07 is affected.
- Version 15.0(1) is affected.
- Version 15.0(1)ES01 is affected.
- Version 15.0(1)ES-MSOauth is affected.
- Version 1501_ES01_CSCws06843 is affected.