Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xiaopi:panel:1.0.0:*:*:*:*:*:*:* |
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xiaopi
Xiaopi panel |
|
| Vendors & Products |
Xiaopi
Xiaopi panel |
Thu, 02 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Xiaopi Panel 1.0.0. This vulnerability affects unknown code of the file /demo.php of the component WAF Firewall. The manipulation of the argument param leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Xiaopi Panel WAF Firewall demo.php cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-03T19:52:05.065Z
Reserved: 2026-04-01T13:57:58.665Z
Link: CVE-2026-5332
Updated: 2026-04-03T19:51:56.472Z
Status : Analyzed
Published: 2026-04-02T14:16:36.163
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5332
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:56:35Z