{"vulnerability": "CVE-2025-20167", "sightings": [{"uuid": "3d5c5f1c-5d55-4354-a0fd-691e1fa4baad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113793626771738794", "content": "", "creation_timestamp": "2025-01-08T16:15:48.219504Z"}, {"uuid": "421c968a-c7e0-4a80-8f58-22ff96936e26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793673125650092", "content": "", "creation_timestamp": "2025-01-08T16:27:35.446103Z"}, {"uuid": "4be69d5a-0e75-4d44-af3c-c222f05f9483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfao3kwu4i2f", "content": "", "creation_timestamp": "2025-01-08T17:15:45.523460Z"}, {"uuid": "bd26f01d-e11a-4890-a36a-d3f3e69cec9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfapmjegmi2h", "content": "", "creation_timestamp": "2025-01-08T17:43:08.889100Z"}, {"uuid": "974273ae-f05a-4fce-96d7-b6c1393c7a9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfgg7slnw222", "content": "", "creation_timestamp": "2025-01-11T00:11:02.201331Z"}, {"uuid": "f2204f1d-6b34-4061-9622-f0f1c29999fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/843", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20167\n\ud83d\udd39 Description: A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\n\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\ud83d\udccf Published: 2025-01-08T16:19:19.794Z\n\ud83d\udccf Modified: 2025-01-08T20:34:39.917Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH\n2. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", "creation_timestamp": "2025-01-08T21:14:18.000000Z"}, {"uuid": "826d7f39-a956-4fbb-9357-1f174632012a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20167", "type": "seen", "source": "https://t.me/cvedetector/14696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20167 - Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20167 \nPublished : Jan. 8, 2025, 5:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.  \n  \nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.  \nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T19:09:26.000000Z"}]}