Description
Comodo Dome Firewall 2.7.0 contains multiple reflected cross-site scripting vulnerabilities in the openvpn_users endpoint that allow attackers to inject malicious scripts through POST parameters. Attackers can submit crafted POST requests with script payloads in the username, remotenets, explicitroutes, static_ip, custom_dns, or custom_domain parameters to execute arbitrary JavaScript in users' browsers.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46408
Various Sources product
https://cdome.comodo.com/firewall/
Various Sources product
https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/comodo-dome-firewall-cross-site-scripting-via-openvpnusers
Scores
CVSS v3
6.1
EPSS
0.0002
EPSS Percentile
4.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
comodo/dome_firewall
2.7.0
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026