Home

Description

Comodo Dome Firewall 2.7.0 contains multiple cross-site scripting vulnerabilities that allow attackers to inject malicious scripts through the policyfw endpoint. Attackers can submit POST requests with JavaScript payloads in the mac, target, and remark parameters to execute arbitrary code in administrator browsers or store persistent scripts in the application.

PUBLISHED Reserved 2026-02-18 | Published 2026-02-19 | Updated 2026-02-19 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

2.7.0
affected

Credits

Ozer Goker finder

References

www.exploit-db.com/exploits/46408 (ExploitDB-46408) exploit

cdome.comodo.com/firewall/ (Comodo Dome Firewall Official Homepage) product

secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase Page) product

www.vulncheck.com/...ewall-cross-site-scripting-via-policyfw (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Cross-Site Scripting via policyfw) third-party-advisory

cve.org (CVE-2019-25421)

nvd.nist.gov (CVE-2019-25421)

Download JSON