Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the mimetypes parameter to /cgi-bin/proxypolicy.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

Endian Firewall versions 3.3.25 and earlier allow attackers who are authenticated to inject arbitrary JavaScript into the "mimetypes" parameter of /cgi-bin/proxypolicy.cgi. This input is stored on the server and executed whenever other users retrieve the affected page, enabling client‑side code execution within the victim’s browser context. The flaw is categorized as a stored cross‑site scripting (CWE‑79) vulnerability and carries a CVSS score of 5.1, indicating a moderate risk level.

Affected Systems

The affected products are Endian Firewall engines, specifically versions 2.1.2, 2.4, 3.3.25, and the community edition release captured by the CPE identifiers. Users running any of these versions should verify their deployment against the vulnerability.

Risk and Exploitability

Exploitation requires legitimate user credentials on the affected firewall instance, as the vulnerability is triggered only by an authenticated attacker. The EPSS score of less than 1% suggests a low probability of real‑world exploitation under current public data. The flaw is not listed in the CISA KEV catalog, indicating no confirmed widespread exploitation has been reported. Nonetheless, because the vulnerability allows arbitrary script execution in the context of privileged users, it can be leveraged for session hijacking, credential theft, or defacement within the internal network. The attack vector is likely a direct POST to the /cgi-bin/proxypolicy.cgi endpoint with a crafted "mimetypes" value, told by the vulnerability description.

Generated by OpenCVE AI on April 6, 2026 at 19:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Endian Firewall to the latest available version that removes the stored XSS flaw (at least 3.3.26 or newer).
  • If an immediate update is not possible, disable or restrict access to the /cgi-bin/proxypolicy.cgi endpoint for non‑essential users or configure the web interface to reject or sanitize the "mimetypes" parameter.
  • Audit user accounts on the firewall and enforce least‑privilege policies to reduce the number of accounts that can potentially exploit the flaw.

Generated by OpenCVE AI on April 6, 2026 at 19:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the mimetypes parameter to /cgi-bin/proxypolicy.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/proxypolicy.cgi mimetypes Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:39:39.633Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34812

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:49.117

Modified: 2026-04-06T16:14:33.147

Link: CVE-2026-34812

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:56:16Z

Weaknesses