Home

Description

MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter.

PUBLISHED Reserved 2026-02-18 | Published 2026-02-18 | Updated 2026-02-20 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unknown

Any version
affected

Credits

Valentin Lobstein finder

References

chocapikk.com/posts/2026/majordomo-revisited/ (MajorDoMo Revisited: What I Missed in 2023) third-party-advisory

github.com/sergejey/majordomo/pull/1177 (Fix PR: sergejey/majordomo#1177) patch

www.vulncheck.com/...cted-cross-site-scripting-in-commandphp (VulnCheck Advisory: MajorDoMo Reflected Cross-Site Scripting in command.php) third-party-advisory

cve.org (CVE-2026-27176)

nvd.nist.gov (CVE-2026-27176)

Download JSON