CVE-2026-20172 PUBLISHED

Cisco Enterprise Chat and Email Lite Agent File Upload Vulnerability

Assigner: cisco
Reserved: 08.10.2025 Published: 06.05.2026 Updated: 06.05.2026

A vulnerability in the Lite Agent feature of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct browser-based attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Agent.

This vulnerability is due to inadequate validation of file contents during file upload operations. An attacker could exploit this vulnerability by uploading a file that contains malicious scripts or HTML code, which the application could make available to other users to access. A successful exploit could allow the attacker to execute the contents of that file in the browser of a user and conduct browser-based attacks. 

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 4.3

Product Status

Vendor Cisco
Product Cisco Enterprise Chat and Email
Versions Default: unknown
  • Version 11.6(1)_ES3 is affected
  • Version 11.6(1)_ES4 is affected
  • Version 12.0(1)_ES6 is affected
  • Version 11.6(1)_ES8 is affected
  • Version 12.0(1)_ES5a is affected
  • Version 11.6(1)_ES9 is affected
  • Version 12.0(1)_ES6_ET1 is affected
  • Version 11.6(1)_ES6 is affected
  • Version 11.6(1)_ES5 is affected
  • Version 12.5(1)_ET1 is affected
  • Version 12.5(1) is affected
  • Version 12.5(1)_ES3_ET1 is affected
  • Version 12.0(1)_ES3 is affected
  • Version 11.6(1)_ES11 is affected
  • Version 12.0(1)_ES4 is affected
  • Version 12.0(1)_ES5 is affected
  • Version 11.6(1)_ES2 is affected
  • Version 11.6(1)_ES9a is affected
  • Version 11.6(1)_ES10 is affected
  • Version 12.0(1)_ES1 is affected
  • Version 12.0(1) is affected
  • Version 12.5(1)_ES3 is affected
  • Version 12.6(1) is affected
  • Version 11.5(1) is affected
  • Version 12.0(1)_ES2 is affected
  • Version 11.6(1)_ES7 is affected
  • Version 12.5(1)_ES2 is affected
  • Version 12.6(1)_ET1 is affected
  • Version 11.6(1) is affected
  • Version 12.5(1)_ES1 is affected
  • Version 12.6(1)_ET2 is affected
  • Version 12.5(1)_ES3_ET2 is affected
  • Version 12.0(1)_ES6_ET2 is affected
  • Version 12.6(1)_ES1 is affected
  • Version 12.5(1)_ES4 is affected
  • Version 11.6(1)_ES12 is affected
  • Version 12.6(1)_ET3 is affected
  • Version 12.5(1)_ES4_ET1 is affected
  • Version 12.0(1)_ES6_ET3 is affected
  • Version 12.6(1)_ES1_ET1 is affected
  • Version 12.6(1)_ES2 is affected
  • Version 12.6_ES2_ET1 is affected
  • Version 12.5(1)_ES5 is affected
  • Version 12.6_ES2_ET2 is affected
  • Version 12.0(1)_ES7 is affected
  • Version 12.6_ES2_ET3 is affected
  • Version 12.0(1)_ES7_ET1 is affected
  • Version 12.5(1)_ES5_ET1 is affected
  • Version 12.6_ES2_ET4 is affected
  • Version 12.6(1)_ES3 is affected
  • Version 11.6(1)_ES12_ET1 is affected
  • Version 12.6_ES3_ET1 is affected
  • Version 12.5(1)_ES6 is affected
  • Version 12.6_ES3_ET2 is affected
  • Version 12.6(1)_ES4 is affected
  • Version 12.5(1)_ES7 is affected
  • Version 12.6(1)_ES4_ET1 is affected
  • Version 12.6(1)_ES5 is affected
  • Version 12.6(1)_ES5_ET1 is affected
  • Version 12.6(1)_ES5_ET2 is affected
  • Version 12.6(1)_ES6 is affected
  • Version 12.6(1)_ES6_ET1 is affected
  • Version 12.5(1)_ES8 is affected
  • Version 12.6(1)_ES6_ET2 is affected
  • Version 12.6(1)_ES7 is affected
  • Version 12.6(1)_ES8 is affected
  • Version 12.6(1)_ES4_ET2 is affected
  • Version 12.6(1)_ES3_ET3 is affected
  • Version 12.6(1)_ES2_ET5 is affected
  • Version 12.6(1)_ES1_ET2 is affected
  • Version 12.6(1)_ES8_ET1 is affected
  • Version 12.6(1)_ES7_ET1 is affected
  • Version 12.6(1)_ES6_ET3 is affected
  • Version 12.6(1)_ES5_ET3 is affected
  • Version 12.5(1)_ES8_ET1 is affected
  • Version 12.5(1)_ES3_ET3 is affected
  • Version 12.5(1)_ES5_ET2 is affected
  • Version 12.5(1)_ES6_ET1 is affected
  • Version 12.5(1)_ES4_ET2 is affected
  • Version 12.5(1)_ES7_ET1 is affected
  • Version 12.6(1)_ES8_ET2 is affected
  • Version 12.6(1)_ES9 is affected
  • Version 12.6(1)_ES9_ET1 is affected
  • Version 12.5(1)_ES9 is affected
  • Version 12.6(1)_ES9_ET2 is affected
  • Version 12.6(1)_ES9_ET3 is affected
  • Version 12.6(1)_ES10 is affected
  • Version 12.6(1)_ES10_ET1 is affected
  • Version 15.0(1) is affected
  • Version 12.6(1)_ES11 is affected
  • Version 15.0(1)_ET1 is affected
  • Version 15.0(1)ES202508 is affected
  • Version 12.6(1)_ES11_ET1 is affected
  • Version 12.6(1)_ES11_ET2 is affected
  • Version 12.6(1)_ES12 is affected
  • Version 15.0(1)ES202511 is affected
  • Version 12.6(1)_ES12_ET1 is affected
  • Version 15.0(1)ES202511_ET1 is affected
  • Version 12.5(1)_ES10 is affected

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

References

Problem Types

  • Reliance on File Name or Extension of Externally-Supplied File cwe