Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the group parameter to /cgi-bin/proxygroup.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting via /cgi-bin/proxygroup.cgi allows authenticated users to inject and store malicious JavaScript that executes for other visitors
Action: Apply Patch
AI Analysis

Impact

Endians Firewall versions 2.x through 3.3.25 and the Community edition contain a stored cross‑site scripting flaw in the group parameter of /cgi-bin/proxygroup.cgi. An attacker who is authenticated and has permission to create proxy groups can inject arbitrary JavaScript that is persisted and run whenever other users view the affected page. The impact includes potential theft of session data, defacement, or execution of further attacks within the victim’s browser context, thereby compromising confidentiality, integrity, and potentially availability of the web interface.

Affected Systems

The vulnerability affects Endian Firewall products across multiple major releases, including version 2.1.2, 2.4, 3.3.25 and the Community edition. All installations of these firmware builds before the fix are susceptible.

Risk and Exploitability

The vulnerability is rated moderate (CVSS 5.1) with an EPSS score of less than 1% and is not listed in CISA's KEV catalog, indicating a relatively low likelihood of widespread exploitation. However, because the attack requires authenticated administrative privileges to create a malicious proxy group, the risk remains significant for organizations with permissive user roles or poorly managed privileges. The exploit path is straightforward: an authorized user submits a specially crafted group value, which is stored and later rendered unescaped in the web UI for any users who access the proxy group page.

Generated by OpenCVE AI on April 6, 2026 at 19:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Endian Firewall to the latest release that contains the XSS fix (at least version 3.3.26 or the most recent update).
  • If an update cannot be performed immediately, restrict the ability to create or edit proxy groups so that only trusted administrators can perform these actions.
  • Periodically review existing proxy groups and delete any that contain suspicious or malicious script content.

Generated by OpenCVE AI on April 6, 2026 at 19:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the group parameter to /cgi-bin/proxygroup.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/proxygroup.cgi group Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-03T19:53:54.727Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34814

cve-icon Vulnrichment

Updated: 2026-04-03T19:53:46.363Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:49.583

Modified: 2026-04-06T16:14:08.087

Link: CVE-2026-34814

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:56:15Z

Weaknesses