Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark user ham spam parameter to /cgi-bin/salearn.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

An authenticated attacker can submit a remark using the user ham spam field in /cgi-bin/salearn.cgi that contains arbitrary JavaScript. The script is stored and executed whenever another user views the page, allowing the attacker to steal credentials, deface the interface, or perform further attacks against users of the same firewall instance.

Affected Systems

The flaw exists in Endian Firewall’s various releases, including 2.1.2, 2.4, 3.3.25, and community builds. All versions prior to a vendor‑supplied fix are affected, so any installation of these versions without the latest patch is at risk.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The EPSS score of less than 1% indicates the likelihood of active exploitation is low, and the vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires the attacker to have authenticated credentials on the firewall; thus it is limited to insiders or compromised accounts. Once authenticated, the attacker can inject arbitrary JavaScript that will run under the privileges of any user who views the affected page.

Generated by OpenCVE AI on April 7, 2026 at 23:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the Endian Firewall version you are running.
  • Check Endian’s official advisory for a patch or upgrade path.
  • Apply the vendor‑supplied patch or upgrade to the latest non‑vulnerable release.
  • If upgrading is not immediately possible, revoke user credentials that are not strictly required and monitor for suspicious activity.

Generated by OpenCVE AI on April 7, 2026 at 23:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark user ham spam parameter to /cgi-bin/salearn.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/salearn.cgi remark user ham spam Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-03T19:55:57.480Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34802

cve-icon Vulnrichment

Updated: 2026-04-03T19:55:52.856Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:46.743

Modified: 2026-04-07T15:40:56.283

Link: CVE-2026-34802

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:56:01Z

Weaknesses