Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.1

Smoothwall Express: Unvalidated Input in Web Interface

CVE-2019-25384
Summary

An attacker can inject malicious scripts into the web interface of Smoothwall Express, potentially allowing them to control users' browsers. This can happen when an attacker sends specially crafted requests to the portfw.cgi script. To protect your system, update to the latest version of Smoothwall Express or apply any available patches.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
smoothwall smoothwall_express 3.1 –
Original title
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vulnerabilities in the portfw.cgi script that allow attackers to inject malicious scripts through un...
Original description
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vulnerabilities in the portfw.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the EXT, SRC_PORT_SEL, SRC_PORT, DEST_IP, DEST_PORT_SEL, or COMMENT parameters to execute arbitrary JavaScript in users' browsers.
nvd CVSS3.1 6.1
nvd CVSS4.0 5.1
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 16 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026