No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smoothwall
Smoothwall express |
|
| Vendors & Products |
Smoothwall
Smoothwall express |
Tue, 31 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link. | |
| Title | Smoothwall Express < 3.1 Update 13 Reflected XSS in redirect.cgi via url Parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-31T18:05:32.880Z
Reserved: 2026-02-19T19:51:07.327Z
Link: CVE-2026-27508
Updated: 2026-03-31T17:51:54.480Z
Status : Awaiting Analysis
Published: 2026-03-30T17:16:15.440
Modified: 2026-04-01T14:24:21.833
Link: CVE-2026-27508
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:40:38Z