Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulnerabilities in the preferences.cgi script that allow attackers to inject malicious scripts through the HOSTNAME, KEYMAP, and OPENNESS parameters. Attackers can submit POST requests with script payloads to preferences.cgi to store malicious code that executes in the browsers of users accessing the preferences page.
Smoothwall Express 3.1 'preferences.cgi' Cross-Site Scripting
Problem type
Affected products
Smoothwall
3.1 - AFFECTED
References
https://www.exploit-db.com/exploits/46333
http://www.smoothwall.org
https://www.vulncheck.com/advisories/smoothwall-express-preferencescgi-cross-site-scrip
GitHub Security Advisories
GHSA-g4hv-3pw6-5x66
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting...
https://github.com/advisories/GHSA-g4hv-3pw6-5x66Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulnerabilities in the preferences.cgi script that allow attackers to inject malicious scripts through the HOSTNAME, KEYMAP, and OPENNESS parameters. Attackers can submit POST requests with script payloads to preferences.cgi to store malicious code that executes in the browsers of users accessing the preferences page.
https://nvd.nist.gov/vuln/detail/CVE-2019-25395
https://www.exploit-db.com/exploits/46333
https://www.vulncheck.com/advisories/smoothwall-express-preferencescgi-cross-site-scrip
http://www.smoothwall.org
https://github.com/advisories/GHSA-g4hv-3pw6-5x66
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25395Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25395",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-02-16T17:05:07.943Z",
"dateReserved": "2026-02-16T16:36:14.402Z",
"datePublished": "2026-02-16T17:05:07.943Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-02-16T17:05:07.943Z"
},
"datePublic": "2019-02-06T00:00:00.000Z",
"title": "Smoothwall Express 3.1 'preferences.cgi' Cross-Site Scripting",
"descriptions": [
{
"lang": "en",
"value": "Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulnerabilities in the preferences.cgi script that allow attackers to inject malicious scripts through the HOSTNAME, KEYMAP, and OPENNESS parameters. Attackers can submit POST requests with script payloads to preferences.cgi to store malicious code that executes in the browsers of users accessing the preferences page."
}
],
"affected": [
{
"vendor": "Smoothwall",
"product": "Smoothwall Express",
"versions": [
{
"version": "3.1",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/46333",
"name": "ExploitDB-46333",
"tags": [
"exploit"
]
},
{
"url": "http://www.smoothwall.org",
"name": "Smoothwall Vendor Homepage",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/smoothwall-express-preferencescgi-cross-site-scrip",
"name": "VulnCheck Advisory: Smoothwall Express 3.1 'preferences.cgi' Cross-Site Scripting",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "Ozer Goker",
"type": "finder"
}
]
}
}
}