Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dnsmasq/hosts/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an attacker with authenticated access to inject arbitrary JavaScript into the remark field of the /manage/dnsmasq/hosts/ page. The input is stored and executed whenever another authenticated user views the page, enabling client‑side code execution that can lead to session hijacking, credential theft, or defacement. The weakness corresponds to a classic stored XSS scenario.

Affected Systems

Ingress systems affected are Endian Firewall versions 2.1.2, 2.4, 3.3.25, and the community edition, all of which store user remarks in the /manage/dnsmasq/hosts/ component. Any installation that has not been upgraded beyond these releases remains vulnerable.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity, while the EPSS score of less than 1% suggests low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated session and a user with permission to edit the remark field, after which the malicious script is persisted and executed for other users.

Generated by OpenCVE AI on April 7, 2026 at 23:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Endian Firewall update that removes the stored XSS flaw in /manage/dnsmasq/hosts/.
  • Restrict editing of the remark field so that only privileged administrators can modify it.
  • Configure a content security policy or web application firewall to block execution of injected scripts.

Generated by OpenCVE AI on April 7, 2026 at 23:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Sat, 04 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dnsmasq/hosts/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /manage/dnsmasq/hosts/ remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T16:22:52.096Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34799

cve-icon Vulnrichment

Updated: 2026-04-02T16:17:44.272Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:46.060

Modified: 2026-04-07T15:41:19.057

Link: CVE-2026-34799

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:56:05Z

Weaknesses