Description

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator.

INFO

Published Date :

2025-02-05T16:14:11.746Z

Last Modified :

2025-02-05T17:20:45.616Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2025-20180 vulnerability.

Vendors Products
Cisco
  • Asyncos
  • Secure Email
  • Secure Email And Web Manager
  • Secure Email And Web Manager M170
  • Secure Email And Web Manager M190
  • Secure Email And Web Manager M195
  • Secure Email And Web Manager M380
  • Secure Email And Web Manager M390
  • Secure Email And Web Manager M390x
  • Secure Email And Web Manager M395
  • Secure Email And Web Manager M680
  • Secure Email And Web Manager M690
  • Secure Email And Web Manager M690x
  • Secure Email And Web Manager M695
  • Secure Email And Web Manager Virtual Appliance M100v
  • Secure Email And Web Manager Virtual Appliance M300v
  • Secure Email And Web Manager Virtual Appliance M600v
  • Secure Email Gateway
  • Secure Email Gateway C195
  • Secure Email Gateway C395
  • Secure Email Gateway C695
  • Secure Email Gateway Virtual Appliance C100v
  • Secure Email Gateway Virtual Appliance C300v
  • Secure Email Gateway Virtual Appliance C600v
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-20180.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact