MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter. | |
| Title | MajorDoMo Reflected Cross-Site Scripting in command.php | |
| First Time appeared |
Sergejey
Sergejey majordomo |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:sergejey:majordomo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sergejey
Sergejey majordomo |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-18T21:10:37.784Z
Reserved: 2026-02-18T15:22:30.053Z
Link: CVE-2026-27176
No data.
Status : Awaiting Analysis
Published: 2026-02-18T22:16:25.440
Modified: 2026-02-19T15:53:02.850
Link: CVE-2026-27176
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:03Z
Weaknesses