Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the NAME parameter to /cgi-bin/uplinkeditor.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an authenticated user to inject arbitrary JavaScript through the NAME parameter of /cgi-bin/uplinkeditor.cgi. The injected script is stored and executed whenever other users load the affected page, enabling potential session hijacking, data theft, or defacement in the web interface. This is a classic stored XSS flaw classified as CWE‑79.

Affected Systems

The problem exists in Endian Firewall products, including the standard Enterprise Edition and the Community edition, for all releases 3.3.25 and earlier as well as 2.1.2, 2.4, and other prior versions listed in the CPE entries.

Risk and Exploitability

With a CVSS score of 5.1, the vulnerability is considered moderate in severity. The EPSS score is below 1 %, indicating a low likelihood of exploitation. No known public exploits are recorded in the KEV catalog. The attack vector is inferred to require authenticated access to the system, typically meaning the attacker must be a legitimate administrator or otherwise have valid user credentials.

Generated by OpenCVE AI on April 7, 2026 at 23:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Endian Firewall to a version newer than 3.3.25, which contains the patch for this XSS flaw.
  • If an immediate upgrade is not possible, restrict the /cgi-bin/uplinkeditor.cgi interface to a minimal set of trusted administrators and monitor for unexpected POST requests on the NAME field.
  • Apply general web input sanitization measures to the NAME parameter, ensuring that any non‑HTML input is properly escaped before storage.
  • Monitor log files for unusual activity or repeated attempts to inject scripts via the uplink editor.

Generated by OpenCVE AI on April 7, 2026 at 23:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the NAME parameter to /cgi-bin/uplinkeditor.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/uplinkeditor.cgi NAME Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:41:03.160Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34800

cve-icon Vulnrichment

Updated: 2026-04-02T18:40:59.051Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:46.267

Modified: 2026-04-07T15:41:11.247

Link: CVE-2026-34800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:56:04Z

Weaknesses