A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.
This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco webex Teams |
|
CPEs | cpe:2.3:a:cisco:webex_teams:44.6.0.29928:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_teams:44.6.0.30148:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_teams:44.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_teams:44.7.0.30141:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_teams:44.7.0.30285:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_teams:44.7:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco webex Teams |
Wed, 16 Apr 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user. | A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user. |
Title | Cisco Webex App Client-Side Remote Code Execution Vulnerability |
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user. | |
Weaknesses | CWE-829 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2025-04-16T16:16:23.291Z
Updated: 2025-04-17T03:55:22.841Z
Reserved: 2024-10-10T19:15:13.237Z
Link: CVE-2025-20236

Updated: 2025-04-16T16:37:41.258Z

Status : Analyzed
Published: 2025-04-16T17:15:49.573
Modified: 2025-08-01T21:03:51.873
Link: CVE-2025-20236

No data.