MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter.
References
| Link | Resource |
|---|---|
| https://chocapikk.com/posts/2026/majordomo-revisited/ | Third Party Advisory Exploit |
| https://github.com/sergejey/majordomo/pull/1177 | Issue Tracking Exploit |
| https://www.vulncheck.com/advisories/majordomo-reflected-cross-site-scripting-in-commandphp | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-18 22:16
Updated : 2026-02-20 20:01
NVD link : CVE-2026-27176
Mitre link : CVE-2026-27176
CVE.ORG link : CVE-2026-27176
JSON object : View
Products Affected
mjdm
- majordomo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
