Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dnsmasq/localdomains/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in Endian Firewall’s administration interface, specifically the remark field on the /manage/dnsmasq/localdomains/ page. An attacker with authenticated access can inject arbitrary JavaScript; the script is persisted and executed whenever other users view the affected page, potentially leading to cookie theft, session hijacking, defacement, or other malicious actions within the web interface.

Affected Systems

The flaw affects Endian Firewall versions up through 3.3.25, including earlier releases such as 2.1.2 and 2.4, as well as the Endian Firewall Community edition. Users running any of these versions should verify whether the /manage/dnsmasq/localdomains/ remark field is enabled and whether they have administrative or editor‑level permissions that allow modification of this field.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score below 1% suggests the vulnerability is unlikely to be exploited widely at present. It is not listed in the CISA KEV catalog, so no publicly known back‑door exploits are documented. However, the requirement for authenticated access means that privileged users could inadvertently or deliberately introduce malicious scripts. An attacker could then compromise the confidentiality or integrity of the web interface for other users. Overall, the risk is moderate to high on systems where privileged users are trusted, and it remains a valid attack vector until patched.

Generated by OpenCVE AI on April 7, 2026 at 19:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest Endian Firewall release that addresses the stored XSS issue.
  • If a patch is not yet available, restrict or disable the /manage/dnsmasq/localdomains/ remark feature for unprivileged users by tightening role‑based access controls.
  • Monitor the administration interface for unexpected JavaScript or redirected requests, and audit logs for anomalous activity.

Generated by OpenCVE AI on April 7, 2026 at 19:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dnsmasq/localdomains/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /manage/dnsmasq/localdomains/ remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:43:35.379Z

Reserved: 2026-03-30T20:26:18.726Z

Link: CVE-2026-34818

cve-icon Vulnrichment

Updated: 2026-04-02T18:43:29.581Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:50.530

Modified: 2026-04-07T14:21:23.107

Link: CVE-2026-34818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:55:50Z

Weaknesses