Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/vpnauthentication/user/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting affecting authenticated users
Action: Apply Patch
AI Analysis

Impact

An authenticated user can enter malicious JavaScript into the remark field on the /manage/vpnauthentication/user/ page. The stored JavaScript is rendered to any user who views that page, allowing the attacker’s code to run in the victim’s browser. The flaw is a classic stored XSS vulnerability, identified in CWE‑79. The consequence is that the attacker can run client‑side scripts in other users’ browsers, potentially manipulating the session or executing unauthorized actions.

Affected Systems

The issue exists in multiple Endian Firewall releases, including version 2.1.2, 2.4, and 3.3.25, as well as the community edition. All listed releases store the remark field content unfiltered and replay it to clients.

Risk and Exploitability

The vulnerability has a CVSS score of 5.1, indicating moderate severity, and an EPSS score below 1 %, suggesting a low probability of active exploitation. Because authentication is required, only users with management privileges can inject payloads. The flaw is not present in the CISA KEV catalog.

Generated by OpenCVE AI on April 7, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Endian Firewall to the latest release that addresses the stored XSS flaw.
  • Verify that the deployed version is not one of the affected releases (2.1.2, 2.4, 3.3.25 or the community edition).
  • Restrict access to the VPN user management interface to trusted administrators only.
  • Monitor administrative logs for unexpected entries in the remark field.

Generated by OpenCVE AI on April 7, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/vpnauthentication/user/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /manage/vpnauthentication/user/ remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:30:23.762Z

Reserved: 2026-03-30T20:26:18.726Z

Link: CVE-2026-34821

cve-icon Vulnrichment

Updated: 2026-04-02T18:29:44.226Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:51.160

Modified: 2026-04-07T14:10:38.580

Link: CVE-2026-34821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:55:47Z

Weaknesses