{"api_version":"1","generated_at":"2026-04-10T16:40:42+00:00","cve":"CVE-2026-20041","urls":{"html":"https://cve.report/CVE-2026-20041","api":"https://cve.report/api/cve/CVE-2026-20041.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-20041","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-20041"},"summary":{"title":"Cisco Nexus Dashboard Server Side Request Forgery Vulnerability","description":"A vulnerability in Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device.\r\n\r\nThis vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by persuading an authenticated user of the device management interface to click a crafted link. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device to an attacker-controlled server. The attacker could then execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.","state":"PUBLISHED","assigner":"cisco","published_at":"2026-04-01 17:28:25","updated_at":"2026-04-03 16:11:11"},"problem_types":["CWE-918","CWE-918 Server-Side Request Forgery (SSRF)"],"metrics":[{"version":"3.1","source":"psirt@cisco.com","type":"Primary","score":"6.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSSV3_1","score":"6.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ssrf-NAen4O7r","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ssrf-NAen4O7r","refsource":"psirt@cisco.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-20041","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-20041","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(3e)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(3c)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(3d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(0d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(2i)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.0(1b)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(2h)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(0c)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 1.1(3f)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.1(1d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.1(1e)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.0(2g)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.0(2h)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.1(2d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.0(1d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.2(1h)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.2(1e)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.2(2d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.1(2f)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.3(1c)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.3(2b)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.3(2c)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.3(2d)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 2.3(2e)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.0(1f)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.0(1i)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.1(1k)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.1(1l)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.2(1e)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.2(1i)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.3(1a)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.3(1b)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.3(2b)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 4.0(1i)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.3(2g)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.2(2f)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.2(2g)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.2(2m)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 3.1(1n)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard","version":"affected 4.1(1g)","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 2.2.2.125","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 2.2.2.126","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 5.0.1.150","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 5.0.1.154","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 5.1.0.131","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 5.1.0.135","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.0.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.0.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.1.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.1.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.1.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.2.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.2.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.3.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Nexus Dashboard Insights","version":"affected 6.4.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[{"source":"CNA","title":"","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.","time":"","lang":"en"}],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"20041","cve":"CVE-2026-20041","epss":"0.000210000","percentile":"0.056450000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:39"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-20041","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-01T18:13:09.025281Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-01T18:13:15.076Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unknown","product":"Cisco Nexus Dashboard","vendor":"Cisco","versions":[{"status":"affected","version":"1.1(3e)"},{"status":"affected","version":"1.1(3c)"},{"status":"affected","version":"1.1(3d)"},{"status":"affected","version":"1.1(0d)"},{"status":"affected","version":"1.1(2i)"},{"status":"affected","version":"2.0(1b)"},{"status":"affected","version":"1.1(2h)"},{"status":"affected","version":"1.1(0c)"},{"status":"affected","version":"1.1(3f)"},{"status":"affected","version":"2.1(1d)"},{"status":"affected","version":"2.1(1e)"},{"status":"affected","version":"2.0(2g)"},{"status":"affected","version":"2.0(2h)"},{"status":"affected","version":"2.1(2d)"},{"status":"affected","version":"2.0(1d)"},{"status":"affected","version":"2.2(1h)"},{"status":"affected","version":"2.2(1e)"},{"status":"affected","version":"2.2(2d)"},{"status":"affected","version":"2.1(2f)"},{"status":"affected","version":"2.3(1c)"},{"status":"affected","version":"2.3(2b)"},{"status":"affected","version":"2.3(2c)"},{"status":"affected","version":"2.3(2d)"},{"status":"affected","version":"2.3(2e)"},{"status":"affected","version":"3.0(1f)"},{"status":"affected","version":"3.0(1i)"},{"status":"affected","version":"3.1(1k)"},{"status":"affected","version":"3.1(1l)"},{"status":"affected","version":"3.2(1e)"},{"status":"affected","version":"3.2(1i)"},{"status":"affected","version":"3.3(1a)"},{"status":"affected","version":"3.3(1b)"},{"status":"affected","version":"3.3(2b)"},{"status":"affected","version":"4.0(1i)"},{"status":"affected","version":"3.3(2g)"},{"status":"affected","version":"3.2(2f)"},{"status":"affected","version":"3.2(2g)"},{"status":"affected","version":"3.2(2m)"},{"status":"affected","version":"3.1(1n)"},{"status":"affected","version":"4.1(1g)"}]},{"defaultStatus":"unknown","product":"Cisco Nexus Dashboard Insights","vendor":"Cisco","versions":[{"status":"affected","version":"2.2.2.125"},{"status":"affected","version":"2.2.2.126"},{"status":"affected","version":"5.0.1.150"},{"status":"affected","version":"5.0.1.154"},{"status":"affected","version":"5.1.0.131"},{"status":"affected","version":"5.1.0.135"},{"status":"affected","version":"6.0.1"},{"status":"affected","version":"6.0.2"},{"status":"affected","version":"6.1.1"},{"status":"affected","version":"6.1.2"},{"status":"affected","version":"6.1.3"},{"status":"affected","version":"6.2.1"},{"status":"affected","version":"6.2.2"},{"status":"affected","version":"6.3.1"},{"status":"affected","version":"6.4.1"}]}],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device.\r\n\r\nThis vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by persuading an authenticated user of the device management interface to click a crafted link. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device to an attacker-controlled server. The attacker could then execute arbitrary script code in the context of the affected interface or access sensitive browser-based information."}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"},"format":"cvssV3_1"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"Server-Side Request Forgery (SSRF)","lang":"en","type":"cwe"}]}],"providerMetadata":{"dateUpdated":"2026-04-01T16:27:49.961Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"cisco-sa-nd-ssrf-NAen4O7r","url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ssrf-NAen4O7r"}],"source":{"advisory":"cisco-sa-nd-ssrf-NAen4O7r","defects":["CSCwq47518"],"discovery":"INTERNAL"},"title":"Cisco Nexus Dashboard Server Side Request Forgery Vulnerability"}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2026-20041","datePublished":"2026-04-01T16:27:49.961Z","dateReserved":"2025-10-08T11:59:15.354Z","dateUpdated":"2026-04-01T18:13:15.076Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-01 17:28:25","lastModifiedDate":"2026-04-03 16:11:11","problem_types":["CWE-918","CWE-918 Server-Side Request Forgery (SSRF)"],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"20041","Ordinal":"1","Title":"Cisco Nexus Dashboard Server Side Request Forgery Vulnerability","CVE":"CVE-2026-20041","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"20041","Ordinal":"1","NoteData":"A vulnerability in Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device.\r\n\r\nThis vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by persuading an authenticated user of the device management interface to click a crafted link. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device to an attacker-controlled server. The attacker could then execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.","Type":"Description","Title":"Cisco Nexus Dashboard Server Side Request Forgery Vulnerability"}]}}}