{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreicyaur6sjzkufjbgwvo32zxsx2whw3ntc2odldmcdjqclgo4frroa",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mmgdn66rxq52"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreif4h45zykullfzy6ufjpxx6gm2wfd34l5u6nysjktdjo23xb2u4he"
    },
    "mimeType": "image/jpeg",
    "size": 341819
  },
  "path": "/2026/05/cisco-patches-cvss-100-secure-workload.html",
  "publishedAt": "2026-05-22T05:36:18.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data.\n\nTracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints.\n\n\"An attacker could exploit this vulnerability if they are able to send",
  "title": "Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access"
}