Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/snat.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability permits authenticated users to inject arbitrary JavaScript through the remark parameter of /cgi-bin/snat.cgi. The input is saved and rendered to other users without proper sanitization, allowing the attacker to execute malicious code in the victim’s browser. This can lead to defacement of the web interface or the exfiltration of session data.

Affected Systems

Endian Firewall releases 2.1.2, 2.4, 3.3.25, and the community edition contain the flaw within the snat.cgi function.

Risk and Exploitability

With a CVSS score of 5.1, the issue is classified as medium severity, while an EPSS score below 1% indicates a low probability of exploitation at this time. It is not listed in the CISA KEV catalog. Because only authenticated administrators can trigger the vulnerability, the threat is limited to users with such privileges, yet a compromised admin account can affect all other users who view the page. The attack is client‑side only; there is no server‑side arbitrary code execution.

Generated by OpenCVE AI on April 7, 2026 at 23:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Endian Firewall updates that resolve the snat.cgi remark XSS vulnerability.
  • If an update is unavailable, restrict or block access to /cgi-bin/snat.cgi from untrusted networks.
  • Use strong, unique administrator credentials and enable multi‑factor authentication.
  • Review administrative and web access logs for suspicious activity.

Generated by OpenCVE AI on April 7, 2026 at 23:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/snat.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/snat.cgi remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:40:24.255Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34806

cve-icon Vulnrichment

Updated: 2026-04-02T18:40:18.493Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:47.857

Modified: 2026-04-07T15:40:22.293

Link: CVE-2026-34806

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:55:57Z

Weaknesses