Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the REMARK parameter to /cgi-bin/openvpnclient.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Stored XSS allows execution of arbitrary JavaScript in the browser of users viewing the OpenVPN client page
Action: Apply Patch
AI Analysis

Impact

The vulnerability permits an authenticated user to inject malicious JavaScript into the REMARK field of the OpenVPN client configuration page. The input is stored in the database and later rendered in the browser, so any user who views the configuration will have the injected script executed in their context, enabling session hijacking, credential theft, or phishing attacks. The weakness is a classic stored cross‑site scripting flaw (CWE‑79).

Affected Systems

Endian Firewall installations using versions 2.1.2, 2.4, or 3.3.25 are impacted. The flaw exists in all releases up to and including those listed by the Common Platform Enumeration strings in this advisory.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access to the administrative interface; the attacker must first log in before injecting the REMARK payload. Once a malicious remark is stored, any subsequent users who load the OpenVPN client page will have the injected script executed in their browsers. The likely attack vector is via the web‑based administrative interface, and the requirement for login credentials makes the threat more suitable for privileged insiders or compromised accounts.

Generated by OpenCVE AI on April 2, 2026 at 16:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether your Endian Firewall instance is running a vulnerable version and note the version number.
  • Upgrade to the latest Endian Firewall release that has patched the /cgi‑bin/openvpnclient.cgi REMARK XSS (e.g., version 3.3.26 or later).
  • If an upgrade cannot be performed immediately, restrict user access to the REMARK field and monitor for suspicious activity.

Generated by OpenCVE AI on April 2, 2026 at 16:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the REMARK parameter to /cgi-bin/openvpnclient.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/openvpnclient.cgi REMARK Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T15:27:40.560Z

Reserved: 2026-03-30T20:26:18.726Z

Link: CVE-2026-34819

cve-icon Vulnrichment

Updated: 2026-04-02T15:27:35.774Z

cve-icon NVD

Status : Received

Published: 2026-04-02T15:16:50.750

Modified: 2026-04-02T15:16:50.750

Link: CVE-2026-34819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:20:25Z

Weaknesses