Impact
This vulnerability allows an authenticated administrator to place arbitrary JavaScript into the remark field of /cgi-bin/xtaccess.cgi. The input is stored by the firewall and then executed whenever any user views the affected page, providing a stored XSS flaw. The weakness corresponds to CWE‑79, which can lead to session hijacking, data exfiltration, or defacement of the web interface.
Affected Systems
Endpoint machines running Endian Firewall versions 3.3.25 and all earlier releases (including 2.1.2 and 2.4) are affected. The vulnerable functionality is the /cgi-bin/xtaccess.cgi script, which accepts a remark parameter that can be manipulated by users with sufficient privileges.
Risk and Exploitability
With a CVSS score of 5.1 the flaw is of moderate severity. Exploitation requires successful authentication and the ability to edit a remark entry, and the vulnerability is not currently listed in the CISA KEV catalog. Though EPSS data is not available, the stored nature of the payload means that once an attacker injects code it can affect multiple users until the remark is removed or rewritten, thereby increasing the potential impact over time.
OpenCVE Enrichment