Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:smoothwall:smoothwall_express:3.1:sp4:*:*:-:*:*:* |
Tue, 17 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smoothwall smoothwall Express
|
|
| Vendors & Products |
Smoothwall smoothwall Express
|
Mon, 16 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by submitting crafted input to the ipblock.cgi endpoint. Attackers can inject script tags through the SRC_IP and COMMENT parameters in POST requests to execute arbitrary JavaScript in users' browsers. | |
| Title | Smoothwall Express 3.1 'ipblock.cgi' Cross-Site Scripting | |
| First Time appeared |
Smoothwall
Smoothwall smoothwall |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:smoothwall:smoothwall:3.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Smoothwall
Smoothwall smoothwall |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:26:32.557Z
Reserved: 2026-02-16T16:32:08.406Z
Link: CVE-2019-25388
Updated: 2026-02-17T14:58:50.630Z
Status : Analyzed
Published: 2026-02-16T18:19:43.473
Modified: 2026-02-20T16:27:01.120
Link: CVE-2019-25388
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:49:11Z