{"id":"CVE-2019-25388","details":"Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by submitting crafted input to the ipblock.cgi endpoint. Attackers can inject script tags through the SRC_IP and COMMENT parameters in POST requests to execute arbitrary JavaScript in users' browsers.","modified":"2026-05-04T08:33:07.928851Z","published":"2026-02-16T18:19:43.473Z","withdrawn":"2026-05-04T08:33:07.928851Z","references":[{"type":"WEB","url":"http://www.smoothwall.org"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/smoothwall-express-ipblockcgi-cross-site-scripting"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/46333"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.1-sp4"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-25388.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}