VYPR
Medium severity4.8NVD Advisory· Published Apr 1, 2026· Updated Apr 3, 2026

CVE-2026-20090

CVE-2026-20090

Description

A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cisco IMC web interface has a stored XSS vulnerability allowing authenticated admin to execute arbitrary script in a user's browser.

Vulnerability

Overview

CVE-2026-20090 is a stored cross-site scripting (XSS) vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) of multiple Cisco products, including 5000 Series ENCS, Catalyst 8300 Series Edge uCPE, UCS C-Series M5/M6 rack servers, and UCS E-Series servers [1]. The vulnerability arises from insufficient validation of user-supplied input, allowing an authenticated attacker with administrative privileges to inject malicious script into the interface [1].

Exploitation

Conditions

To exploit this vulnerability, an attacker must first authenticate to the Cisco IMC web interface with administrative credentials. The attacker then injects malicious script into a stored field (e.g., a configuration parameter). The exploit is triggered when a different user (or the same user) accesses the affected interface and clicks a crafted link, which causes the injected script to execute in the context of the victim's browser session [1]. No additional network access beyond the management interface is required, but the attacker must have admin privilege requirement limits the attack surface to already-trusted users.

Impact

Successful exploitation allows the attacker to execute arbitrary script code in the victim's browser. This can lead to session hijacking, defacement, or theft of sensitive browser-based information such as cookies or authentication tokens [1]. Because the attacker is already an admin, the primary risk is lateral movement or privilege escalation within the management interface's user sessions.

Mitigation

Cisco has released software updates that address this vulnerability. There are no workarounds available [1]. Administrators should upgrade to the latest fixed version of Cisco IMC for their respective platforms. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of publication.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.