CVE-2025-20188
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
07/05/2025
Last modified:
23/06/2025
Description
A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system.<br />
<br />
This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



