Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities
Multiple stored cross-site scripting (XSS) vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject malicious code into specific pages of the interface, leading to arbitrary script execution or sensitive information access.
Cisco Identity Services Engine (ISE) is susceptible to stored cross-site scripting (XSS) vulnerabilities within its web-based management interface. Disclosed on May 5, 2026, these flaws stem from insufficient validation of user-supplied input. An attacker with valid administrative credentials can inject malicious code into specific pages of the ISE interface. Successful exploitation allows the attacker to execute arbitrary script code within the context of the interface or access sensitive browser-based information. These vulnerabilities pose a risk to the confidentiality and integrity of the ISE system and the data it manages, requiring immediate patching.
Attack Chain
- An attacker obtains valid administrative credentials for the Cisco ISE web-based management interface, potentially through credential theft or social engineering.
- The attacker logs into the ISE web-based management interface.
- The attacker navigates to a specific page within the interface that is vulnerable to stored XSS (CVE-2025-20204, CVE-2025-20205).
- The attacker injects malicious JavaScript code into a field that is not properly validated. This could be a configuration setting, a user profile, or any other editable field.
- The malicious code is stored within the ISE system’s database or configuration files.
- A legitimate administrator or user accesses the page containing the stored XSS payload.
- The malicious JavaScript code is executed within the user’s browser, in the context of the ISE web interface.
- The attacker can now perform actions such as stealing cookies, redirecting the user to a malicious website, or modifying the content of the ISE interface.
Impact
Successful exploitation of these XSS vulnerabilities can compromise the confidentiality and integrity of the Cisco ISE system. An attacker could potentially gain unauthorized access to sensitive information, such as network configurations, user credentials, and security policies. They could also modify the ISE interface to phish for credentials or redirect users to malicious websites. Given the central role of ISE in network access control, these vulnerabilities could have a significant impact on the security of the entire network.
Recommendation
- Apply the software updates released by Cisco to address CVE-2025-20204 and CVE-2025-20205 on all affected Cisco Identity Services Engine (ISE) instances.
- Deploy the Sigma rule “Detect Cisco ISE XSS Attempt via HTTP Request” to your SIEM to identify potential exploitation attempts targeting the web interface.
- Review and enforce strong password policies for all administrative accounts on Cisco ISE to reduce the risk of credential compromise.
- Monitor web server logs for suspicious activity, particularly requests containing potentially malicious JavaScript code, to identify and investigate potential XSS attacks.
Detection coverage 2
Detect Cisco ISE XSS Attempt via HTTP Request
mediumDetects potential XSS attempts against Cisco ISE web interface by looking for script tags and event handlers in HTTP requests.
Detect Cisco ISE XSS Attempt via HTTP Body
mediumDetects potential XSS attempts against Cisco ISE web interface by looking for script tags and event handlers in HTTP request body.
Detection queries are kept inside the platform. Get full rules →