CVE-2025-20120
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
02/04/2025
Last modified:
06/08/2025
Description
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.<br />
<br />
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:prime_infrastructure:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.0.39:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.1.56:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2.1:-:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2.1:update01:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2.2:-:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2.2:update03:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:prime_infrastructure:2.2.2:update04:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



