CVE-2026-20219 PUBLISHED

Assigner: cisco
Reserved: 08.10.2025 Published: 06.05.2026 Updated: 06.05.2026

A vulnerability in the REST API of Cisco Slido could have allowed an authenticated, remote attacker to access the social profile data of other users or affect quiz and poll results. Cisco has addressed this vulnerability in Cisco Slido and no customer action is needed.

This vulnerability existed because of the presence of an insecure direct object reference. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by sending a crafted request to the vulnerable API endpoint. A successful exploit could have allowed the attacker to view the social profiles of other users or affect quiz and poll results.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS Score: 5.4

Product Status

Vendor Cisco
Product Cisco Webex Meetings
Versions
  • Version 39.10 is affected
  • Version 39.11 is affected
  • Version 39.6 is affected
  • Version 39.7 is affected
  • Version 39.7.4 is affected
  • Version 39.7.7 is affected
  • Version 39.8 is affected
  • Version 39.8.2 is affected
  • Version 39.8.3 is affected
  • Version 39.8.4 is affected
  • Version 39.9 is affected
  • Version 39.9.1 is affected
  • Version 40.1 is affected
  • Version 40.2 is affected
  • Version 40.4 is affected
  • Version 40.4.10 is affected
  • Version 40.6 is affected
  • Version 40.6.2 is affected
  • Version 42.10 is affected
  • Version 42.11 is affected
  • Version 42.6 is affected
  • Version 42.9 is affected
  • Version 42.12 is affected
  • Version 42.7 is affected
  • Version 43.1 is affected
  • Version 43.4 is affected
  • Version 43.4.2 is affected
  • Version 43.5.0 is affected
  • Version 43.4.1 is affected
Vendor Cisco
Product Cisco Slido
Versions
  • Version N/A is affected

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

References

Problem Types

  • Authorization Bypass Through User-Controlled Key cwe