Comodo Dome Firewall 2.7.0 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input to the newLicense parameter. Attackers can send POST requests to the license activation endpoint with script payloads in the newLicense field to execute arbitrary JavaScript in administrators' browsers.
References
| Link | Resource |
|---|---|
| https://cdome.comodo.com/firewall/ | Product |
| https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278 | Not Applicable |
| https://www.exploit-db.com/exploits/46408 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/comodo-dome-firewall-stored-cross-site-scripting-via-licenseactivation | Broken Link |
Configurations
History
No history.
Information
Published : 2026-02-19 13:16
Updated : 2026-02-20 17:20
NVD link : CVE-2019-25405
Mitre link : CVE-2019-25405
CVE.ORG link : CVE-2019-25405
JSON object : View
Products Affected
comodo
- dome_firewall
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
