Description
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input to the protocol parameter. Attackers can send POST requests to the QoS rules management endpoint with JavaScript payloads in the protocol parameter to execute arbitrary code in administrator browsers.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46408
Various Sources product
https://cdome.comodo.com/firewall/
Various Sources product
https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/comodo-dome-firewall-reflected-cross-site-scripting-via-qos-rules
Scores
CVSS v3
6.1
EPSS
0.0002
EPSS Percentile
6.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
comodo/dome_firewall
< 2.7.0
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026