Description
A stored Cross-Site Scripting (XSS) vulnerability has been identified in the SonicWall Email Security appliance due to improper neutralization of user-supplied input during web page generation, allowing a remote authenticated attacker as admin user to potentially execute arbitrary JavaScript code.
Published: 2026-03-31
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS in admin web interface that enables arbitrary JavaScript execution by an authenticated administrator
Action: Apply Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Stored XSS in SonicWall Email Security allows admin to execute JavaScript

Mon, 13 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall esa5000
Sonicwall esa5050
Sonicwall esa7000
Sonicwall esa7050
Sonicwall esa9000
CPEs cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa5000:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa5050:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa7000:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa7050:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:esa9000:-:*:*:*:*:*:*:*
Vendors & Products Sonicwall esa5000
Sonicwall esa5050
Sonicwall esa7000
Sonicwall esa7050
Sonicwall esa9000

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Stored XSS in SonicWall Email Security allows admin to execute JavaScript
First Time appeared Sonicwall
Sonicwall email Security
Vendors & Products Sonicwall
Sonicwall email Security

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description A stored Cross-Site Scripting (XSS) vulnerability has been identified in the SonicWall Email Security appliance due to improper neutralization of user-supplied input during web page generation, allowing a remote authenticated attacker as admin user to potentially execute arbitrary JavaScript code.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Sonicwall Email Security Esa5000 Esa5050 Esa7000 Esa7050 Esa9000
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-03-31T20:35:38.252Z

Reserved: 2026-03-03T09:59:57.366Z

Link: CVE-2026-3468

cve-icon Vulnrichment

Updated: 2026-03-31T20:35:34.532Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T21:16:32.950

Modified: 2026-04-13T16:50:20.080

Link: CVE-2026-3468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:42:19Z

Weaknesses