Comodo Dome Firewall 2.7.0 contains multiple reflected cross-site scripting vulnerabilities in the /korugan/proxyconfig endpoint that allow attackers to inject malicious scripts through POST parameters. Attackers can submit crafted POST requests with JavaScript payloads in parameters like PROXY_PORT, VISIBLE_HOSTNAME, ADMIN_MAIL_ADDRESS, CACHE_MEM, MAX_SIZE, MIN_SIZE, and DST_NOCACHE to execute arbitrary scripts in administrator browsers.
References
| Link | Resource |
|---|---|
| https://cdome.comodo.com/firewall/ | Product |
| https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278 | Not Applicable |
| https://www.exploit-db.com/exploits/46408 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/comodo-dome-firewall-cross-site-scripting-via-proxyconfig | Third Party Advisory |
Configurations
History
20 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cdome.comodo.com/firewall/ - Product | |
| References | () https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278 - Not Applicable | |
| References | () https://www.exploit-db.com/exploits/46408 - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/comodo-dome-firewall-cross-site-scripting-via-proxyconfig - Third Party Advisory | |
| CPE | cpe:2.3:a:comodo:dome_firewall:*:*:*:*:*:*:*:* | |
| First Time |
Comodo
Comodo dome Firewall |
19 Feb 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 13:16
Updated : 2026-02-20 17:16
NVD link : CVE-2019-25423
Mitre link : CVE-2019-25423
CVE.ORG link : CVE-2019-25423
JSON object : View
Products Affected
comodo
- dome_firewall
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
