Comodo Dome Firewall 2.7.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by submitting crafted input through admin management parameters. Attackers can inject script payloads in the admin_name, name, and surname parameters via POST requests to the /korugan/admins endpoint, which are stored and executed when administrators access the interface.

Project Subscriptions

Vendors Products
Comodo Dome Firewall Subscribe
Dome Firewall Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Comodo
Comodo dome Firewall
CPEs cpe:2.3:a:comodo:dome_firewall:*:*:*:*:*:*:*:*
Vendors & Products Comodo
Comodo dome Firewall

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cdome
Cdome comodo Dome Firewall
Vendors & Products Cdome
Cdome comodo Dome Firewall

Thu, 19 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
Description Comodo Dome Firewall 2.7.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by submitting crafted input through admin management parameters. Attackers can inject script payloads in the admin_name, name, and surname parameters via POST requests to the /korugan/admins endpoint, which are stored and executed when administrators access the interface.
Title Comodo Dome Firewall 2.7.0 Stored Cross-Site Scripting via admins
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-19T16:39:14.847Z

Reserved: 2026-02-18T22:37:36.783Z

Link: CVE-2019-25404

cve-icon Vulnrichment

Updated: 2026-02-19T16:39:00.602Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T13:16:13.160

Modified: 2026-02-20T17:20:23.390

Link: CVE-2019-25404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-20T10:07:10Z

Weaknesses