CVE-2026-27508
Reflected XSS in Smoothwall Express /redirect.cgi Allows Script Execution
Publication date: 2026-03-30
Last updated on: 2026-04-14
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| smoothwall | smoothwall_express | to 3.0 (inc) |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
| smoothwall | smoothwall_express | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability is a reflected cross-site scripting (XSS) issue that allows execution of arbitrary JavaScript in users' browsers via crafted URLs. While the CVE description and resources detail the technical nature and mitigation of the vulnerability, there is no explicit information provided about its direct impact on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-27508 is a reflected cross-site scripting (XSS) vulnerability found in Smoothwall Express versions prior to 3.1 Update 13. It exists in the /redirect.cgi endpoint due to improper sanitization of the "url" parameter.
Attackers can craft malicious URLs containing JavaScript schemes that, when clicked by victims, execute arbitrary JavaScript code in their browsers. This happens because the input is not properly neutralized before being included in the web page.
This vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and requires user interaction to be exploited.
How can this vulnerability impact me? :
This vulnerability allows attackers to execute arbitrary JavaScript in the browsers of users who click on maliciously crafted links. This can lead to various impacts such as theft of session cookies, defacement of web content, or redirection to malicious sites.
Because the attack requires user interaction (clicking the malicious link), the risk depends on user behavior and awareness.
The CVSS v4 base score of 5.1 indicates a moderate severity with low attack complexity and no privileges required, but user interaction is necessary.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves reflected cross-site scripting in the /redirect.cgi endpoint due to improper sanitization of the url parameter. Detection can involve monitoring for suspicious URLs containing the "javascript:" scheme being accessed or attempted on the /redirect.cgi endpoint.
You can detect potential exploitation attempts by searching web server logs for requests to /redirect.cgi with url parameters containing "javascript:" or other suspicious script content.
- Example command to search Apache or Nginx logs for suspicious requests: grep -i '/redirect.cgi' /var/log/apache2/access.log | grep -i 'url=javascript:'
- Alternatively, use: grep -i '/redirect.cgi' /var/log/nginx/access.log | grep -i 'url=javascript:'
Additionally, monitoring for unusual user agent strings or repeated attempts to access /redirect.cgi with suspicious parameters may help identify exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to upgrade Smoothwall Express to version 3.1 Update 13 or later, which includes fixes that sanitize the url parameter and reject javascript: URI schemes in the /redirect.cgi endpoint.
After upgrading, reboot the system or restart the smoothd daemon using the command: killall smoothd; smoothd
Perform a hard refresh in your browser (e.g., Ctrl+F5 or Ctrl+Click reload) to ensure the latest Javascript updates are loaded, especially on Chrome/Chromium browsers.
These steps will mitigate the reflected XSS vulnerability by enforcing proper input validation and sanitization.