Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/incoming.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in Endian Firewall via the remark parameter of the /cgi‑bin/incoming.cgi endpoint. An authenticated attacker can submit arbitrary JavaScript that is persisted and executed whenever any user views the affected page. The weakness is a classic stored XSS (CWE‑79) that can lead to session hijacking, defacement, or theft of sensitive information if a victim’s browser processes the injected script.

Affected Systems

The vulnerability affects Endian Firewall versions 3.3.25 and earlier, including releases 2.1.2, 2.4, 3.3.25, as well as the community edition. No specific sub‑versions are listed beyond the major and minor numbers provided.

Risk and Exploitability

The CVSS base score is 5.1, indicating moderate risk, while the EPSS score is reported as below 1%, suggesting low probability of exploitation in the wild. The flaw is not currently cataloged in CISA’s KEV list. Exploitation requires an authenticated user with permissions to submit remarks; the attacker’s malicious payload is then presented to other authenticated or unauthenticated users who access the page, allowing the attacker to execute arbitrary JavaScript in their browsers.

Generated by OpenCVE AI on April 7, 2026 at 23:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Endian’s official website for a patch or newer firmware that removes the vulnerability in Endian Firewall.
  • Upgrade the firewall to the latest supported release that does not have the affected /cgi‑bin/incoming.cgi remark functionality.
  • If an immediate upgrade is not possible, remove or disable the remark feature via the firewall’s configuration interface to prevent injection.
  • Apply a web‑application firewall rule or content‑security‑policy header to mitigate the impact of any stored XSS if the flaw is already present.

Generated by OpenCVE AI on April 7, 2026 at 23:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/incoming.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/incoming.cgi remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T15:26:08.966Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34807

cve-icon Vulnrichment

Updated: 2026-04-02T15:26:04.442Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:48.073

Modified: 2026-04-07T15:40:10.753

Link: CVE-2026-34807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:55:56Z

Weaknesses