Description
SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in log.php via the search query parameter. The application embeds the unsanitized parameter value directly into an HTML input value attribute, allowing an unauthenticated remote attacker to inject and execute arbitrary JavaScript in a victim's browser if the victim visits a crafted URL. This can be used to steal session data, perform actions as the victim, or modify displayed content.
Published: 2026-02-20
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The flaw arises when the search query parameter in log.php is written directly into an HTML input value without any sanitization. An attacker can construct a URL containing malicious JavaScript; when a victim opens that link the script executes in the victim’s browser. This lets the attacker steal session cookies, perform actions on behalf of the user, or alter displayed content. The weakness is a classic reflected XSS problem identified as CWE‑79.

Affected Systems

SVXportal 2.5 and all earlier releases from sa2blv are impacted. Versions newer than 2.5 are presumed to have the issue resolved.

Risk and Exploitability

The CVSS score of 5.1 labels the vulnerability as moderate, yet the EPSS score is below 1% and it is not listed in the CISA KEV catalog, indicating a low likelihood of exploitation at this time. An attacker can exploit it remotely and without authentication by luring a user to a crafted URL. The main risk is the potential for session hijacking or unauthorized actions performed in the victim’s name.

Generated by OpenCVE AI on April 17, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SVXportal to a version newer than 2.5 where the patch is available.
  • Modify log.php to sanitize or HTML‑encode the search parameter before embedding it in the page.
  • Deploy a Content Security Policy that disallows inline scripts and limits script execution to trusted origins.

Generated by OpenCVE AI on April 17, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Sa2blv
Sa2blv svxportal
Vendors & Products Sa2blv
Sa2blv svxportal

Mon, 23 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Radioinorr
Radioinorr svxportal
CPEs cpe:2.3:a:radioinorr:svxportal:*:*:*:*:*:*:*:*
Vendors & Products Radioinorr
Radioinorr svxportal

Fri, 20 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in log.php via the search query parameter. The application embeds the unsanitized parameter value directly into an HTML input value attribute, allowing an unauthenticated remote attacker to inject and execute arbitrary JavaScript in a victim's browser if the victim visits a crafted URL. This can be used to steal session data, perform actions as the victim, or modify displayed content.
Title SVXportal <= 2.5 log.php Search Reflected XSS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Radioinorr Svxportal
Sa2blv Svxportal
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-20T20:12:00.277Z

Reserved: 2026-02-19T19:51:07.326Z

Link: CVE-2026-27502

cve-icon Vulnrichment

Updated: 2026-02-20T19:44:04.132Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-20T17:25:56.750

Modified: 2026-02-23T13:59:18.180

Link: CVE-2026-27502

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:30:23Z

Weaknesses