5.4
CVE-2026-20219
- EPSS 0.04%
- Veröffentlicht 06.05.2026 17:16:21
- Zuletzt bearbeitet 06.05.2026 18:59:53
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of other users or affect quiz and poll results. Cisco has addressed this vulnerability in Cisco Slido and no customer action is needed. This vulnerability existed because of the presence of an insecure direct object reference. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by sending a crafted request to the vulnerable API endpoint. A successful exploit could have allowed the attacker to view the social profiles of other users or affect quiz and poll results.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco Webex Meetings
Version
39.10
Status
affected
Version
39.11
Status
affected
Version
39.6
Status
affected
Version
39.7
Status
affected
Version
39.7.4
Status
affected
Version
39.7.7
Status
affected
Version
39.8
Status
affected
Version
39.8.2
Status
affected
Version
39.8.3
Status
affected
Version
39.8.4
Status
affected
Version
39.9
Status
affected
Version
39.9.1
Status
affected
Version
40.1
Status
affected
Version
40.2
Status
affected
Version
40.4
Status
affected
Version
40.4.10
Status
affected
Version
40.6
Status
affected
Version
40.6.2
Status
affected
Version
42.10
Status
affected
Version
42.11
Status
affected
Version
42.6
Status
affected
Version
42.9
Status
affected
Version
42.12
Status
affected
Version
42.7
Status
affected
Version
43.1
Status
affected
Version
43.4
Status
affected
Version
43.4.2
Status
affected
Version
43.5.0
Status
affected
Version
43.4.1
Status
affected
HerstellerCisco
≫
Produkt
Cisco Slido
Version
N/A
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.126 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.