{"vulnerability": "CVE-2025-20166", "sightings": [{"uuid": "90faa58d-2e1d-4d80-88a6-2547c4d1dc8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113793626771738794", "content": "", "creation_timestamp": "2025-01-08T16:15:48.187527Z"}, {"uuid": "a2c4e6db-d9c2-4705-9015-f6ba3d6d85b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793673111799579", "content": "", "creation_timestamp": "2025-01-08T16:27:35.109080Z"}, {"uuid": "3fdc8be2-ea4e-4192-9318-a1c70f8ab31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfao3hx3hw2m", "content": "", "creation_timestamp": "2025-01-08T17:15:42.341894Z"}, {"uuid": "c854037b-4c69-409b-8670-0ec11cfc363e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfapmjopda2q", "content": "", "creation_timestamp": "2025-01-08T17:43:10.366041Z"}, {"uuid": "9aaa2c36-c48c-4522-886b-9c581487e92e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfgg7slnw222", "content": "", "creation_timestamp": "2025-01-11T00:11:02.152192Z"}, {"uuid": "a1ca7c82-8d7b-4b57-aa7c-f40b2c7213d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/847", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20166\n\ud83d\udd39 Description: A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\n\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\ud83d\udccf Published: 2025-01-08T16:19:12.224Z\n\ud83d\udccf Modified: 2025-01-08T20:30:37.679Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH\n2. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", "creation_timestamp": "2025-01-08T21:14:48.000000Z"}, {"uuid": "65feee88-64bd-4da2-ade2-cbb0ce4039fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20166", "type": "seen", "source": "https://t.me/cvedetector/14698", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20166 - Cisco CSPC Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20166 \nPublished : Jan. 8, 2025, 5:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.  \n  \nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.  \nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T19:09:28.000000Z"}]}