Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link. | |
| Title | Smoothwall Express < 3.1 Update 13 Reflected XSS in redirect.cgi via url Parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-30T16:51:50.165Z
Reserved: 2026-02-19T19:51:07.327Z
Link: CVE-2026-27508
No data.
Status : Received
Published: 2026-03-30T17:16:15.440
Modified: 2026-03-30T17:16:15.440
Link: CVE-2026-27508
No data.
OpenCVE Enrichment
No data.