CVE-2026-27502

SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in log.php via the search query parameter. The application embeds the unsanitized parameter value directly into an HTML input value attribute, allowing an unauthenticated remote attacker to inject and execute arbitrary JavaScript in a victim's browser if the victim visits a crafted URL. This can be used to steal session data, perform actions as the victim, or modify displayed content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:radioinorr:svxportal:*:*:*:*:*:*:*:*

History

23 Feb 2026, 13:59

Type Values Removed Values Added
CPE cpe:2.3:a:radioinorr:svxportal:*:*:*:*:*:*:*:*
First Time Radioinorr
Radioinorr svxportal
References () https://github.com/sa2blv/SVXportal/blob/master/log.php - () https://github.com/sa2blv/SVXportal/blob/master/log.php - Product
References () https://www.vulncheck.com/advisories/svxportal-log-php-search-reflected-xss - () https://www.vulncheck.com/advisories/svxportal-log-php-search-reflected-xss - Third Party Advisory

20 Feb 2026, 21:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

20 Feb 2026, 17:25

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-20 17:25

Updated : 2026-02-23 13:59


NVD link : CVE-2026-27502

Mitre link : CVE-2026-27502

CVE.ORG link : CVE-2026-27502


JSON object : View

Products Affected

radioinorr

  • svxportal
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')