Description
Comodo Dome Firewall 2.7.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by submitting crafted input through admin management parameters. Attackers can inject script payloads in the admin_name, name, and surname parameters via POST requests to the /korugan/admins endpoint, which are stored and executed when administrators access the interface.
Exploits (1)
References (4)
Core 4
Core References
Various Sources product
https://cdome.comodo.com/firewall/
Various Sources product
https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/comodo-dome-firewall-stored-cross-site-scripting-via-admins
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46408
Scores
CVSS v3
6.4
EPSS
0.0002
EPSS Percentile
4.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
comodo/dome_firewall
< 2.7.0
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026