CVE-2019-25378

MEDIUM

Smoothwall Express 3.1-SP4 - XSS

Title source: llm
STIX 2.1

Description

Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple cross-site scripting vulnerabilities in the proxy.cgi endpoint that allow attackers to inject malicious scripts through parameters including CACHE_SIZE, MAX_SIZE, MIN_SIZE, MAX_OUTGOING_SIZE, and MAX_INCOMING_SIZE. Attackers can submit POST requests with script payloads to store or reflect arbitrary JavaScript code that executes in users' browsers when the proxy configuration page is accessed.

Exploits (1)

exploitdb WORKING POC
by Ozer Goker · textwebappscgi
https://www.exploit-db.com/exploits/46333

References (3)

Core 3
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46333
Various Sources product
http://www.smoothwall.org

Scores

CVSS v3 6.1
EPSS 0.0004
EPSS Percentile 12.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (1)
smoothwall/smoothwall_express 3.1 (2 CPE variants)
Published Feb 16, 2026
Tracked Since Feb 18, 2026