MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter. | |
| Title | MajorDoMo Reflected Cross-Site Scripting in command.php | |
| First Time appeared |
Sergejey
Sergejey majordomo |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:sergejey:majordomo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sergejey
Sergejey majordomo |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-18T21:10:37.784Z
Reserved: 2026-02-18T15:22:30.053Z
Link: CVE-2026-27176
No data.
Status : Received
Published: 2026-02-18T22:16:25.440
Modified: 2026-02-18T22:16:25.440
Link: CVE-2026-27176
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:03Z