CVE-2026-27508
Description
Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link.
CWE
- CWE-79 — CWE-79 Improper neutralization of input during web page generation ('cross-site scripting')
Affected
- Smoothwall / Express — v=0 ≤3.1 Update 13 [affected]
CVSS
- 4.0 score=5.1 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N - 3.1 score=5.4 severity=MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
References
- https://community.smoothwall.org/forum/viewtopic.php?t=45095 vendor-advisory, patch
- https://www.vulncheck.com/advisories/smoothwall-express-reflected-xss-in-redirect-cgi-via-url-parameter third-party-advisory
Source
cvelistV5-main/cves/2026/27xxx/CVE-2026-27508.json