The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
Cisco SD-WAN vManage Software releases 20.1.12 and earlier and Release 20.3.1
Refer to Cisco advisory for the complete list of affected products and their respective patches.