CVE-2026-20035 PUBLISHED

Cisco Unity Connection Server-Side Request Forgery Vulnerability

Assigner: cisco
Reserved: 08.10.2025 Published: 06.05.2026 Updated: 06.05.2026

A vulnerability in the web UI of Cisco Unity Connection Web Inbox could allow an unauthenticated, remote attacker to conduct SSRF attacks through an affected device.

This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
CVSS Score: 7.2

Product Status

Vendor Cisco
Product Cisco Unity Connection
Versions Default: unknown
  • Version 12.5(1) is affected
  • Version 12.5(1)SU1 is affected
  • Version 12.5(1)SU2 is affected
  • Version 12.5(1)SU3 is affected
  • Version 12.5(1)SU4 is affected
  • Version 14 is affected
  • Version 12.5(1)SU5 is affected
  • Version 14SU1 is affected
  • Version 12.5(1)SU6 is affected
  • Version 14SU2 is affected
  • Version 12.5(1)SU7 is affected
  • Version 14SU3 is affected
  • Version 12.5(1)SU8 is affected
  • Version 14SU3a is affected
  • Version 12.5(1)SU8a is affected
  • Version 15 is affected
  • Version 15SU1 is affected
  • Version 14SU4 is affected
  • Version 12.5(1)SU9 is affected
  • Version 15SU2 is affected
  • Version 15SU3 is affected

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

References

Problem Types

  • Server-Side Request Forgery (SSRF) cwe