Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the DOMAIN parameter to /cgi-bin/smtpdomains.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability exists in Endian Firewall versions up to and including 3.3.25. It allows an authenticated attacker to inject arbitrary JavaScript into the DOMAIN parameter of /cgi-bin/smtpdomains.cgi. The injected script is stored on the server and executed whenever other users load the affected page, resulting in a stored cross‑site scripting flaw classified as CWE‑79. Such client‑side code execution could enable the attacker to steal data from the victim’s browser, deface the interface, or serve further malicious payloads. The possibility of session cookie theft or other malicious actions is inferred from the nature of the flaw and is not directly confirmed by the official description.

Affected Systems

The affected product family is Endian Firewall, including commercial releases 2.1.2, 2.4, and 3.3.25, as well as the community edition. All these versions expose the /cgi-bin/smtpdomains.cgi endpoint for managing SMTP domain entries. Any installation running one of these releases is vulnerable if the web interface remains accessible to authenticated users with permission to edit domain settings.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity level, while the EPSS score of less than 1% suggests a low likelihood of widespread automated exploitation. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog, implying no publicly documented exploits. Exploitation requires a valid authenticated session with sufficient privileges to submit a value for the DOMAIN field; the attack vector is therefore an authenticated web‑application vulnerability with client‑side impact.

Generated by OpenCVE AI on April 6, 2026 at 20:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Endian Firewall update that includes the XSS fix.
  • If an update is not available, limit access to the /cgi-bin/smtpdomains.cgi interface to authenticated administrators only and block external access.
  • Review and delete any stored DOMAIN entries that contain malicious scripts.
  • Verify the fix by accessing the page as a non‑privileged user to confirm that no JavaScript executes.
  • Check the Endian Firewall vendor site periodically for new security advisories and apply any additional recommended settings.

Generated by OpenCVE AI on April 6, 2026 at 20:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the DOMAIN parameter to /cgi-bin/smtpdomains.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/smtpdomains.cgi DOMAIN Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:38:27.441Z

Reserved: 2026-03-30T20:26:18.726Z

Link: CVE-2026-34815

cve-icon Vulnrichment

Updated: 2026-04-02T18:38:23.766Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:49.817

Modified: 2026-04-06T16:13:52.973

Link: CVE-2026-34815

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:56:14Z

Weaknesses