CVE-2026-20117: Unauth XSS in Cisco CCX Web UI
CVE-2026-20117 Published on March 11, 2026
Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities
A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Vulnerability Analysis
CVE-2026-20117 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2026-20117 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2026-20117
Want to know whenever a new CVE is published for Cisco Unified Contact Center Express? stack.watch will email you.
Affected Versions
Cisco Unified Contact Center Express:- Version 10.5(1)SU1 is affected.
- Version 10.6(1) is affected.
- Version 11.6(1) is affected.
- Version 10.6(1)SU1 is affected.
- Version 10.6(1)SU3 is affected.
- Version 11.6(2) is affected.
- Version 12.0(1) is affected.
- Version 11.0(1)SU1 is affected.
- Version 11.5(1)SU1 is affected.
- Version 10.5(1) is affected.
- Version 12.5(1) is affected.
- Version 12.5(1)SU1 is affected.
- Version 12.5(1)SU2 is affected.
- Version 12.5(1)SU3 is affected.
- Version 12.5(1)_SU03_ES01 is affected.
- Version 12.5(1)_SU03_ES02 is affected.
- Version 12.5(1)_SU02_ES03 is affected.
- Version 12.5(1)_SU02_ES04 is affected.
- Version 12.5(1)_SU02_ES02 is affected.
- Version 12.5(1)_SU01_ES02 is affected.
- Version 12.5(1)_SU01_ES03 is affected.
- Version 12.5(1)_SU02_ES01 is affected.
- Version 11.6(2)ES07 is affected.
- Version 11.6(2)ES08 is affected.
- Version 12.5(1)_SU01_ES01 is affected.
- Version 12.0(1)ES04 is affected.
- Version 12.5(1)ES02 is affected.
- Version 12.5(1)ES03 is affected.
- Version 11.6(2)ES06 is affected.
- Version 12.5(1)ES01 is affected.
- Version 12.0(1)ES03 is affected.
- Version 12.0(1)ES01 is affected.
- Version 11.6(2)ES05 is affected.
- Version 12.0(1)ES02 is affected.
- Version 11.6(2)ES04 is affected.
- Version 11.6(2)ES03 is affected.
- Version 11.6(2)ES02 is affected.
- Version 11.6(2)ES01 is affected.
- Version 10.6(1)SU3ES03 is affected.
- Version 11.0(1)SU1ES03 is affected.
- Version 10.6(1)SU3ES01 is affected.
- Version 10.5(1)SU1ES10 is affected.
- Version 11.5(1)SU1ES03 is affected.
- Version 11.6(1)ES02 is affected.
- Version 11.5(1)ES01 is affected.
- Version 10.6(1)SU2 is affected.
- Version 10.6(1)SU2ES04 is affected.
- Version 11.6(1)ES01 is affected.
- Version 10.6(1)SU3ES02 is affected.
- Version 11.5(1)SU1ES02 is affected.
- Version 11.5(1)SU1ES01 is affected.
- Version 11.0(1)SU1ES02 is affected.
- Version 12.5(1)_SU03_ES03 is affected.
- Version 12.5(1)_SU03_ES04 is affected.
- Version 12.5(1)_SU03_ES05 is affected.
- Version UCCX 15.0.1 is affected.
- Version 12.5(1)_SU03_ES06 is affected.
- Version 12.5(1)_SU03_ES07 is affected.
- Version 15.0(1) is affected.
- Version 15.0(1)ES01 is affected.
- Version 15.0(1)ES-MSOauth is affected.
- Version 1501_ES01_CSCws06843 is affected.