Description
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the ID parameter. Attackers can craft requests to the /manage/ips/appid/ endpoint with script payloads in the ID parameter to execute arbitrary JavaScript in victim browsers.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46408
Various Sources product
https://cdome.comodo.com/firewall/
Various Sources product
https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/comodo-dome-firewall-reflected-cross-site-scripting-via-id-parameter-appid
Scores
CVSS v3
6.1
EPSS
0.0004
EPSS Percentile
13.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
comodo/dome_firewall
< 2.7.0
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026