Vulnerability Description
A vulnerability in the Contact Center Express (CCX) Editor application of Cisco Unified CCX could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative permissions pertaining to script creation and execution. This vulnerability is due to improper authentication mechanisms in the communication between the CCX Editor and an affected Unified CCX server. An attacker could exploit this vulnerability by redirecting the authentication flow to a malicious server and tricking the CCX Editor into believing the authentication was successful. A successful exploit could allow the attacker to create and execute arbitrary scripts on the underlying operating system of an affected Unified CCX server, as an internal non-root user account.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Unified Contact Center Express | < 12.5\(1\)_su03_es07 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-20358?
CVE-2025-20358 is a vulnerability with a CVSS score of 9.4 (CRITICAL). A vulnerability in the Contact Center Express (CCX) Editor application of Cisco Unified CCX could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative permissio...
How severe is CVE-2025-20358?
CVE-2025-20358 has been rated CRITICAL with a CVSS base score of 9.4/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-20358?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Unified Contact Center Express.