{"vulnerability": "CVE-2025-20168", "sightings": [{"uuid": "08339d4c-5e0a-447e-9643-6ede7f3cd965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113793626771738794", "content": "", "creation_timestamp": "2025-01-08T16:15:48.246131Z"}, {"uuid": "34ea305f-d076-42fc-8b93-0ef73f1637b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793673139597116", "content": "", "creation_timestamp": "2025-01-08T16:27:36.274280Z"}, {"uuid": "37227704-7c7a-43ca-a5f7-899aef2dcc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfao3n5pky2a", "content": "", "creation_timestamp": "2025-01-08T17:15:47.831056Z"}, {"uuid": "d4b2e1fe-15fc-4a80-81b6-4521e9660903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfapmjlidu2q", "content": "", "creation_timestamp": "2025-01-08T17:43:09.896330Z"}, {"uuid": "a3901353-e3b6-4d84-883d-5edb5c34dd60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfgg7slnw222", "content": "", "creation_timestamp": "2025-01-11T00:11:02.250222Z"}, {"uuid": "d2846636-4c59-4a0e-8fb6-ed7b7aa85e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/842", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20168\n\ud83d\udd39 Description: A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\n\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\ud83d\udccf Published: 2025-01-08T16:19:28.312Z\n\ud83d\udccf Modified: 2025-01-08T20:36:51.770Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH\n2. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", "creation_timestamp": "2025-01-08T21:14:12.000000Z"}, {"uuid": "b8044ac8-9003-4bb1-9ad5-52a69c7ac26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20168", "type": "seen", "source": "https://t.me/cvedetector/14697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20168 - Cisco Common Services Platform Collector Critical XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20168 \nPublished : Jan. 8, 2025, 5:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.  \n  \nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.  \nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T19:09:27.000000Z"}]}