CVE-2026-34815
Stored XSS in Endian Firewall SMTPDomains Allows Script Injection
Publication date: 2026-04-02
Last updated on: 2026-04-06
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| endian | firewall_community | to 3.3.25 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-34815 is a stored cross-site scripting (XSS) vulnerability found in Endian Firewall versions 3.3.25 and earlier. It occurs in the /cgi-bin/smtpdomains.cgi script via the DOMAIN parameter.
An authenticated attacker can inject arbitrary JavaScript code into this DOMAIN parameter. This malicious code is then stored on the server and executed when other users view the affected page.
This vulnerability is classified under CWE-79, which relates to improper neutralization of input during web page generation.
How can this vulnerability impact me? :
This vulnerability allows an authenticated attacker to inject malicious JavaScript that executes in the browsers of other users who view the affected page.
The impact includes potential compromise of user security, such as theft of session tokens, redirection to malicious sites, or other actions performed by the injected script.
The CVSS v3.1 score of 6.4 indicates a medium severity with low attack complexity but requiring authentication, and it can affect confidentiality and integrity.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of malicious or unexpected JavaScript code injected into the DOMAIN parameter of the /cgi-bin/smtpdomains.cgi script on Endian Firewall versions 3.3.25 and earlier.
Since the vulnerability requires authentication, detection involves reviewing authenticated user inputs or monitoring HTTP requests to the /cgi-bin/smtpdomains.cgi endpoint for suspicious DOMAIN parameter values containing JavaScript code.
- Use web server access logs to search for POST or GET requests to /cgi-bin/smtpdomains.cgi with DOMAIN parameters containing script tags or JavaScript code.
- Example command to search logs for suspicious DOMAIN parameter usage (assuming Apache logs):
- grep -i 'smtpdomains.cgi' /var/log/apache2/access.log | grep -E 'DOMAIN=.*<script|DOMAIN=.*javascript:'
- Use a web proxy or interception tool (e.g., Burp Suite) to monitor and analyze authenticated requests to the vulnerable endpoint for injected scripts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable /cgi-bin/smtpdomains.cgi script to trusted users only, as exploitation requires authentication.
Additionally, review and sanitize inputs to the DOMAIN parameter to prevent injection of malicious JavaScript code.
- Apply any available patches or updates from Endian Firewall that address this vulnerability.
- If patches are not yet available, consider disabling or restricting access to the /cgi-bin/smtpdomains.cgi endpoint temporarily.
- Educate authenticated users about the risk of injecting scripts and monitor logs for suspicious activity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability is a stored cross-site scripting (XSS) issue that allows an authenticated attacker to inject and execute arbitrary JavaScript code when other users view the affected page. This can lead to unauthorized actions or data exposure in the context of the affected application.
While the CVE description and resources do not explicitly mention compliance with standards such as GDPR or HIPAA, stored XSS vulnerabilities can potentially impact compliance by exposing user data or enabling unauthorized access, which may violate data protection and privacy requirements under these regulations.
Organizations using the affected Endian Firewall versions should consider this vulnerability in their risk assessments and remediation plans to maintain compliance with relevant security and privacy standards.