A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.
This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only).
                
            References
                    | Link | Resource | 
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    25 Aug 2025, 14:44
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:* | |
| Summary | 
 | |
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny - Vendor Advisory | |
| First Time | Cisco Cisco secure Firewall Management Center | 
14 Aug 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-14 17:15
Updated : 2025-08-25 14:44
NVD link : CVE-2025-20148
Mitre link : CVE-2025-20148
CVE.ORG link : CVE-2025-20148
JSON object : View
Products Affected
                cisco
- secure_firewall_management_center
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
