Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/xtaccess.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

This vulnerability allows an authenticated user on an Endian Firewall appliance to store and execute arbitrary JavaScript through the remark field of /cgi-bin/xtaccess.cgi. The injected script is persisted and runs automatically when other users view the impacted page, exposing them to potential script‑based attacks.

Affected Systems

Endian Firewall 2.1.2, 2.4, 3.3.25 and community editions before those releases are vulnerable. No newer releases have been confirmed to contain the flaw.

Risk and Exploitability

The flaw scores 5.1 on the CVSS scale and has an EPSS percentage lower than one percent, indicating a low likelihood of widespread exploitation. It does not appear on the CISA KEV list. The attacker must authenticate to the administrative interface but does not need higher privileges beyond that to insert the malicious remark. Because the malicious content is stored, any subsequent user who retrieves the remark will have the script executed in their browser.

Generated by OpenCVE AI on April 7, 2026 at 21:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Endian Firewall appliance to a version newer than 3.3.25 or apply the vendor patch that sanitizes the remark input.
  • If an upgrade cannot be performed immediately, disable or restrict access to /cgi-bin/xtaccess.cgi to prevent script injection.
  • Verify that the remark field properly escapes or removes JavaScript before it is stored by testing with harmless input that contains script tags.

Generated by OpenCVE AI on April 7, 2026 at 21:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/xtaccess.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/xtaccess.cgi remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T16:22:37.720Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34811

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:48.917

Modified: 2026-04-07T14:22:02.710

Link: CVE-2026-34811

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:55:51Z

Weaknesses