Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple cross-site scripting vulnerabilities in the proxy.cgi endpoint that allow attackers to inject malicious scripts through parameters including CACHE_SIZE, MAX_SIZE, MIN_SIZE, MAX_OUTGOING_SIZE, and MAX_INCOMING_SIZE. Attackers can submit POST requests with script payloads to store or reflect arbitrary JavaScript code that executes in users' browsers when the proxy configuration page is accessed.
History

Wed, 18 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:smoothwall:smoothwall_express:3.1:*:*:*:*:*:*:*

Tue, 17 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Smoothwall smoothwall Express
Vendors & Products Smoothwall smoothwall Express

Mon, 16 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple cross-site scripting vulnerabilities in the proxy.cgi endpoint that allow attackers to inject malicious scripts through parameters including CACHE_SIZE, MAX_SIZE, MIN_SIZE, MAX_OUTGOING_SIZE, and MAX_INCOMING_SIZE. Attackers can submit POST requests with script payloads to store or reflect arbitrary JavaScript code that executes in users' browsers when the proxy configuration page is accessed.
Title Smoothwall Express 3.1 'proxy.cgi' Cross-Site Scripting
First Time appeared Smoothwall
Smoothwall smoothwall
Weaknesses CWE-79
CPEs cpe:2.3:a:smoothwall:smoothwall:3.1:*:*:*:*:*:*:*
Vendors & Products Smoothwall
Smoothwall smoothwall
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-02-16T17:04:53.222Z

Updated: 2026-02-17T16:49:43.661Z

Reserved: 2026-02-16T16:26:01.084Z

Link: CVE-2019-25378

cve-icon Vulnrichment

Updated: 2026-02-17T14:49:44.647Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T18:19:41.430

Modified: 2026-02-18T20:17:20.210

Link: CVE-2019-25378

cve-icon Redhat

No data.