Cisco Webex Vulnerability Allows Remote Code Execution via Malicious Meeting Links

Cisco has issued security updates for a high-severity vulnerability in Webex (CVE-2025-20236) that allows unauthenticated attackers to gain remote code execution on affected systems. The flaw, found in Webex’s custom URL parser, can be exploited by tricking users into clicking on a malicious meeting invite link that downloads arbitrary files. Once downloaded, attackers can execute commands with the privileges of the targeted user.

This vulnerability impacts Webex installations across all operating systems and requires immediate software updates to mitigate risks, as there are no workarounds. Cisco’s security advisory indicates that Webex versions 44.5 and earlier are not vulnerable, while versions 44.6 and 44.7 must be updated to patched versions to avoid exploitation.

Additionally, Cisco addressed other vulnerabilities, including a privilege escalation flaw in Secure Network Analytics (CVE-2025-20178) and a remote LDAP user enumeration bug in Nexus Dashboard (CVE-2025-20150). While there are no reports of active exploitation, users are urged to apply patches promptly.

The vulnerability comes on the heels of Cisco’s warning about a critical flaw in the Smart Licensing Utility (CVE-2024-20439), which is actively being exploited in the wild. For more information about the vulnerability, refer to the Cisco Security Advisory.