CVE-2026-27508
Received Received - Intake
Reflected XSS in Smoothwall Express /redirect.cgi Allows Script Execution

Publication date: 2026-03-30

Last updated on: 2026-04-14

Assigner: VulnCheck

Description
Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-30
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-03-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 13 associated CPEs
Vendor Product Version / Range
smoothwall smoothwall_express to 3.0 (inc)
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
smoothwall smoothwall_express 3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a reflected cross-site scripting (XSS) issue that allows execution of arbitrary JavaScript in users' browsers via crafted URLs. While the CVE description and resources detail the technical nature and mitigation of the vulnerability, there is no explicit information provided about its direct impact on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-27508 is a reflected cross-site scripting (XSS) vulnerability found in Smoothwall Express versions prior to 3.1 Update 13. It exists in the /redirect.cgi endpoint due to improper sanitization of the "url" parameter.

Attackers can craft malicious URLs containing JavaScript schemes that, when clicked by victims, execute arbitrary JavaScript code in their browsers. This happens because the input is not properly neutralized before being included in the web page.

This vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and requires user interaction to be exploited.


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary JavaScript in the browsers of users who click on maliciously crafted links. This can lead to various impacts such as theft of session cookies, defacement of web content, or redirection to malicious sites.

Because the attack requires user interaction (clicking the malicious link), the risk depends on user behavior and awareness.

The CVSS v4 base score of 5.1 indicates a moderate severity with low attack complexity and no privileges required, but user interaction is necessary.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves reflected cross-site scripting in the /redirect.cgi endpoint due to improper sanitization of the url parameter. Detection can involve monitoring for suspicious URLs containing the "javascript:" scheme being accessed or attempted on the /redirect.cgi endpoint.

You can detect potential exploitation attempts by searching web server logs for requests to /redirect.cgi with url parameters containing "javascript:" or other suspicious script content.

  • Example command to search Apache or Nginx logs for suspicious requests: grep -i '/redirect.cgi' /var/log/apache2/access.log | grep -i 'url=javascript:'
  • Alternatively, use: grep -i '/redirect.cgi' /var/log/nginx/access.log | grep -i 'url=javascript:'

Additionally, monitoring for unusual user agent strings or repeated attempts to access /redirect.cgi with suspicious parameters may help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade Smoothwall Express to version 3.1 Update 13 or later, which includes fixes that sanitize the url parameter and reject javascript: URI schemes in the /redirect.cgi endpoint.

After upgrading, reboot the system or restart the smoothd daemon using the command: killall smoothd; smoothd

Perform a hard refresh in your browser (e.g., Ctrl+F5 or Ctrl+Click reload) to ensure the latest Javascript updates are loaded, especially on Chrome/Chromium browsers.

These steps will mitigate the reflected XSS vulnerability by enforcing proper input validation and sanitization.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart