Home

Description

Comodo Dome Firewall 2.7.0 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input to the newLicense parameter. Attackers can send POST requests to the license activation endpoint with script payloads in the newLicense field to execute arbitrary JavaScript in administrators' browsers.

PUBLISHED Reserved 2026-02-18 | Published 2026-02-19 | Updated 2026-02-19 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

2.7.0
affected

Credits

Ozer Goker finder

References

www.exploit-db.com/exploits/46408 (ExploitDB-46408) exploit

cdome.comodo.com/firewall/ (Comodo Dome Firewall Official Homepage) product

secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase Page) product

www.vulncheck.com/...ss-site-scripting-via-licenseactivation (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Stored Cross-Site Scripting via license_activation) third-party-advisory

cve.org (CVE-2019-25405)

nvd.nist.gov (CVE-2019-25405)

Download JSON