Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability

🚨 SEVERITY: MEDIUM — CVSS 4.8 Security Advisory

TL;DR 📌

A cross-site scripting (XSS) vulnerability has been identified in the Cisco BroadWorks CommPilot Application Software, which could allow an authenticated attacker to execute arbitrary scripts. The highest CVSS score is 4.8, categorized as Medium severity. No workarounds are available, and users are advised to upgrade to fixed software versions.

What happened 🕵️‍♂️

A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot Application Software has been discovered. This flaw allows an authenticated remote attacker to conduct cross-site scripting (XSS) attacks by injecting malicious code into specific pages of the interface. Successful exploitation could enable the attacker to execute arbitrary script code or access sensitive browser-based information. To exploit this vulnerability, the attacker must possess valid administrative credentials.

Affected products 🖥️

The vulnerability affects the following Cisco BroadWorks CommPilot Application Software releases:

  • 23.0 (Migrate to a fixed release)
  • 24.0 (Fixed in 24.0.2025.05)
  • 25.0 (Migrate to a fixed release)
  • 26.0 (Fixed in 26.0.2025.05)

Additionally, it impacts earlier versions of the Cisco BroadWorks Application Server and BroadWorks Xtended Services Platform.

Fixed software 🔧

Upgrade to the first fixed release in your train (or later):

Release / Product First Fixed Release Notes
23.0 Migrate to a fixed release.
24.0 24.0.2025.05
25.0 Migrate to a fixed release.
26.0 26.0.2025.05
1.1 Changed all instances of BroadWorks Application Delivery Platform to the appropriate deployment options for BroadWorks CommPilot Application.
1.0 Initial public release.
Cisco BroadWorks CommPilot Application 24.0.2025.05
Cisco BroadWorks CommPilot Application 26.0.2025.05
Cisco BroadWorks Application Server RI.2025.05 Earlier than RI.2025.05
BroadWorks Xtended Services Platform RI.2025.08 Earlier than RI.2025.08

Workarounds 🧯

There are no workarounds available for this vulnerability.

Risk in context 🎯

With a CVSS score of 4.8, this vulnerability is rated as Medium severity. The risk is primarily driven by the requirement for authenticated access, which limits exposure but still poses a significant threat if exploited. The absence of workarounds necessitates prompt action to upgrade to fixed software to mitigate potential risks.

Fast facts ⚡

  • Vulnerability Type: Cross-Site Scripting (XSS)
  • CVSS Score: 4.8 (Medium)
  • Exploitation Requirement: Valid administrative credentials
  • Workarounds: None available
  • Fixed Releases: Available for specific versions

For leadership 🧭

This vulnerability presents a Medium risk to our organization, as it requires authenticated access to exploit. However, if exploited, it could lead to unauthorized script execution and access to sensitive information. Immediate remediation is necessary, with a recommendation to patch within 7 days, as fixes are available. The operational impact involves a brief maintenance window with no expected configuration drift.

Now: Review affected systems and begin planning for upgrades.
Next: Schedule patching for the identified software versions.
Later: Monitor for any updates or additional advisories related to this vulnerability.