Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-xpgj-x2hj-7mq2
Vulnerability from github
Published
2025-06-04 18:30
Modified
2025-06-04 18:30
Severity ?
VLAI Severity ?
Details
A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.
This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker.
{ "affected": [], "aliases": [ "CVE-2025-20129" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-06-04T17:15:25Z", "severity": "MODERATE" }, "details": "A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.\n\nThis vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker.", "id": "GHSA-xpgj-x2hj-7mq2", "modified": "2025-06-04T18:30:58Z", "published": "2025-06-04T18:30:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20129" }, { "type": "WEB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
CVE-2025-20129 (GCVE-0-2025-20129)
Vulnerability from cvelistv5
Published
2025-06-04 16:17
Modified
2025-06-04 18:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.
This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco SocialMiner |
Version: 12.5(1)ES01 Version: 10.5(1) Version: 11.6(1) Version: 10.6(1) Version: 12.0(1)ES04 Version: 10.6(2) Version: 12.5(1) Version: 11.6(2) Version: 12.0(1) Version: 12.0(1)ES02 Version: 11.0(1) Version: 11.5(1) Version: 11.5(1)SU1 Version: 12.0(1)ES03 Version: 12.5(1)SU3 Version: 12.5(1)SU1 Version: 12.5(1)SU2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20129", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-04T18:13:19.983909Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-04T18:20:18.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco SocialMiner", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "10.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Contact Center Express", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.6(1)" }, { "status": "affected", "version": "10.5(1)SU1" }, { "status": "affected", "version": "10.6(1)SU3" }, { "status": "affected", "version": "12.0(1)" }, { "status": "affected", "version": "10.0(1)SU1" }, { "status": "affected", "version": "10.6(1)SU1" }, { "status": "affected", "version": "11.0(1)SU1" }, { "status": "affected", "version": "11.5(1)SU1" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "11.6(1)" }, { "status": "affected", "version": "11.6(2)" }, { "status": "affected", "version": "12.5(1)" }, { "status": "affected", "version": "12.5(1)SU1" }, { "status": "affected", "version": "12.5(1)SU2" }, { "status": "affected", "version": "12.5(1)SU3" }, { "status": "affected", "version": "12.5(1)_SU03_ES01" }, { "status": "affected", "version": "12.5(1)_SU03_ES02" }, { "status": "affected", "version": "12.5(1)_SU02_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES04" }, { "status": "affected", "version": "12.5(1)_SU02_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES02" }, { "status": "affected", "version": "12.5(1)_SU01_ES03" }, { "status": "affected", "version": "12.5(1)_SU02_ES01" }, { "status": "affected", "version": "11.6(2)ES07" }, { "status": "affected", "version": "11.6(2)ES08" }, { "status": "affected", "version": "12.5(1)_SU01_ES01" }, { "status": "affected", "version": "12.0(1)ES04" }, { "status": "affected", "version": "12.5(1)ES02" }, { "status": "affected", "version": "12.5(1)ES03" }, { "status": "affected", "version": "11.6(2)ES06" }, { "status": "affected", "version": "12.5(1)ES01" }, { "status": "affected", "version": "12.0(1)ES03" }, { "status": "affected", "version": "12.0(1)ES01" }, { "status": "affected", "version": "11.6(2)ES05" }, { "status": "affected", "version": "12.0(1)ES02" }, { "status": "affected", "version": "11.6(2)ES04" }, { "status": "affected", "version": "11.6(2)ES03" }, { "status": "affected", "version": "11.6(2)ES02" }, { "status": "affected", "version": "11.6(2)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES03" }, { "status": "affected", "version": "11.0(1)SU1ES03" }, { "status": "affected", "version": "10.6(1)SU3ES01" }, { "status": "affected", "version": "10.5(1)SU1ES10" }, { "status": "affected", "version": "10.0(1)SU1ES04" }, { "status": "affected", "version": "11.5(1)SU1ES03" }, { "status": "affected", "version": "11.6(1)ES02" }, { "status": "affected", "version": "11.5(1)ES01" }, { "status": "affected", "version": "9.0(2)SU3ES04" }, { "status": "affected", "version": "10.6(1)SU2" }, { "status": "affected", "version": "10.6(1)SU2ES04" }, { "status": "affected", "version": "11.6(1)ES01" }, { "status": "affected", "version": "10.6(1)SU3ES02" }, { "status": "affected", "version": "11.5(1)SU1ES02" }, { "status": "affected", "version": "11.5(1)SU1ES01" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "11.0(1)SU1ES02" }, { "status": "affected", "version": "12.5(1)_SU03_ES03" }, { "status": "affected", "version": "12.5(1)_SU03_ES04" }, { "status": "affected", "version": "12.5(1)_SU03_ES05" }, { "status": "affected", "version": "12.5(1)_SU03_ES06" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.\r\n\r\nThis vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-04T16:17:27.318Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ccp-info-disc-ZyGerQpd", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd" } ], "source": { "advisory": "cisco-sa-ccp-info-disc-ZyGerQpd", "defects": [ "CSCwh43988" ], "discovery": "EXTERNAL" }, "title": "Cisco Customer Collaboration Platform Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20129", "datePublished": "2025-06-04T16:17:27.318Z", "dateReserved": "2024-10-10T19:15:13.212Z", "dateUpdated": "2025-06-04T18:20:18.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…