CVE-2026-20055
Description
Multiple vulnerabilities in the web-based management interface of Cisco Packaged Contact Center Enterprise (Packaged CCE) and Cisco Unified Contact Center Enterprise (Unified CCE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cisco Packaged CCE and Unified CCE have multiple XSS vulnerabilities allowing authenticated remote attackers to execute script in the web management interface.
Multiple cross-site scripting (XSS) vulnerabilities exist in the web-based management interface of Cisco Packaged Contact Center Enterprise (Packaged CCE) and Cisco Unified Contact Center Enterprise (Unified CCE). The vulnerabilities stem from improper validation of user-supplied input by the interface, enabling an attacker to inject malicious code into specific pages. [1]
To exploit these vulnerabilities, an attacker must have valid administrative credentials and be authenticated to the affected device. The attacker can then inject script code into the web management interface, which will be executed in the context of the interface when viewed by another administrator. [1]
A successful exploit could allow the attacker to execute arbitrary script code or access sensitive browser-based information. This could lead to further compromise within the administrative environment. [1]
Cisco has released software updates to address these vulnerabilities. There are no workarounds available. Administrators are advised to apply the patches as soon as possible. [1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.