CVE-2026-27177: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergejey MajorDoMo
MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability via the /objects/?op=set endpoint, which is intentionally unauthenticated for IoT device integration. User-supplied property values are stored raw in the database without sanitization. When an administrator views the property editor in the admin panel, the stored values are rendered without escaping in both a paragraph tag (SOURCE field) and a textarea element (VALUE field). The XSS fires on page load without requiring any click from the admin. Additionally, the session cookie lacks the HttpOnly flag, enabling session hijack via document.cookie exfiltration. An attacker can enumerate properties via the unauthenticated /api.php/data/ endpoint and poison any property with malicious JavaScript.
AI Analysis
Technical Summary
MajorDoMo, a home automation platform designed for IoT device integration, suffers from a stored cross-site scripting (XSS) vulnerability identified as CVE-2026-27177. The vulnerability arises from the /objects/?op=set endpoint, which is intentionally left unauthenticated to facilitate IoT device integration. This endpoint accepts user-supplied property values that are stored directly in the backend database without any input sanitization or encoding. When an administrator accesses the property editor within the admin panel, these stored values are rendered directly into the HTML page inside a paragraph tag (SOURCE field) and a textarea element (VALUE field) without escaping. This unsafe rendering leads to the execution of malicious JavaScript code embedded in the property values immediately upon page load, without requiring any click or additional user interaction. Compounding the risk, the session cookie used by the admin panel lacks the HttpOnly attribute, allowing the attacker’s script to access document.cookie and exfiltrate session tokens, facilitating session hijacking. Furthermore, the attacker can enumerate existing properties through the unauthenticated /api.php/data/ endpoint and inject malicious payloads into any property, effectively poisoning the admin interface. The vulnerability has a CVSS 4.0 score of 5.3, indicating medium severity, with an attack vector over the network, no privileges or authentication required, and no user interaction needed. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it a credible threat, especially in environments where the admin panel is accessible or insufficiently protected. The lack of input validation and improper output encoding are classic web application security failures that enable this attack vector. The vulnerability affects version 0 of MajorDoMo, and no official patches or mitigations have been linked yet.
Potential Impact
For European organizations using MajorDoMo for IoT home or building automation, this vulnerability could lead to unauthorized administrative access through session hijacking, resulting in potential manipulation or disruption of IoT devices and automation workflows. Confidentiality is at risk due to session token theft, and integrity is compromised as attackers can inject malicious scripts that alter system behavior or steal sensitive data. Availability could be indirectly affected if attackers disable or misconfigure devices. Since the attack requires no authentication and can be triggered remotely, organizations with exposed or poorly segmented admin interfaces are particularly vulnerable. This risk extends to smart buildings, residential complexes, and enterprises relying on MajorDoMo for automation, potentially impacting privacy and operational continuity. The medium severity score reflects a moderate but tangible threat, especially given the unauthenticated access to the vulnerable endpoint. The lack of HttpOnly on cookies exacerbates the risk by enabling session hijacking. European organizations with lax network segmentation or insufficient access controls for IoT management interfaces face increased exposure. The threat also raises compliance concerns under GDPR due to potential unauthorized access and data leakage.
Mitigation Recommendations
European organizations should immediately restrict network access to the MajorDoMo admin panel and related endpoints, ensuring they are not exposed to the public internet. Implement strict firewall rules or VPN access to limit administrative interface exposure. Apply input validation and output encoding controls at the application level to sanitize all user-supplied data before storage and rendering, particularly for the /objects/?op=set endpoint. If possible, disable or secure the unauthenticated API endpoints to prevent property enumeration and poisoning. Enforce the HttpOnly flag on session cookies to prevent client-side script access. Monitor logs for unusual activity related to property modifications or API calls. Conduct regular security assessments and penetration tests focusing on IoT management platforms. Until an official patch is available, consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting MajorDoMo endpoints. Educate administrators on the risks of accessing the admin panel from untrusted networks or devices. Finally, maintain an incident response plan tailored to IoT platform compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2026-27177: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergejey MajorDoMo
Description
MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability via the /objects/?op=set endpoint, which is intentionally unauthenticated for IoT device integration. User-supplied property values are stored raw in the database without sanitization. When an administrator views the property editor in the admin panel, the stored values are rendered without escaping in both a paragraph tag (SOURCE field) and a textarea element (VALUE field). The XSS fires on page load without requiring any click from the admin. Additionally, the session cookie lacks the HttpOnly flag, enabling session hijack via document.cookie exfiltration. An attacker can enumerate properties via the unauthenticated /api.php/data/ endpoint and poison any property with malicious JavaScript.
AI-Powered Analysis
Technical Analysis
MajorDoMo, a home automation platform designed for IoT device integration, suffers from a stored cross-site scripting (XSS) vulnerability identified as CVE-2026-27177. The vulnerability arises from the /objects/?op=set endpoint, which is intentionally left unauthenticated to facilitate IoT device integration. This endpoint accepts user-supplied property values that are stored directly in the backend database without any input sanitization or encoding. When an administrator accesses the property editor within the admin panel, these stored values are rendered directly into the HTML page inside a paragraph tag (SOURCE field) and a textarea element (VALUE field) without escaping. This unsafe rendering leads to the execution of malicious JavaScript code embedded in the property values immediately upon page load, without requiring any click or additional user interaction. Compounding the risk, the session cookie used by the admin panel lacks the HttpOnly attribute, allowing the attacker’s script to access document.cookie and exfiltrate session tokens, facilitating session hijacking. Furthermore, the attacker can enumerate existing properties through the unauthenticated /api.php/data/ endpoint and inject malicious payloads into any property, effectively poisoning the admin interface. The vulnerability has a CVSS 4.0 score of 5.3, indicating medium severity, with an attack vector over the network, no privileges or authentication required, and no user interaction needed. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it a credible threat, especially in environments where the admin panel is accessible or insufficiently protected. The lack of input validation and improper output encoding are classic web application security failures that enable this attack vector. The vulnerability affects version 0 of MajorDoMo, and no official patches or mitigations have been linked yet.
Potential Impact
For European organizations using MajorDoMo for IoT home or building automation, this vulnerability could lead to unauthorized administrative access through session hijacking, resulting in potential manipulation or disruption of IoT devices and automation workflows. Confidentiality is at risk due to session token theft, and integrity is compromised as attackers can inject malicious scripts that alter system behavior or steal sensitive data. Availability could be indirectly affected if attackers disable or misconfigure devices. Since the attack requires no authentication and can be triggered remotely, organizations with exposed or poorly segmented admin interfaces are particularly vulnerable. This risk extends to smart buildings, residential complexes, and enterprises relying on MajorDoMo for automation, potentially impacting privacy and operational continuity. The medium severity score reflects a moderate but tangible threat, especially given the unauthenticated access to the vulnerable endpoint. The lack of HttpOnly on cookies exacerbates the risk by enabling session hijacking. European organizations with lax network segmentation or insufficient access controls for IoT management interfaces face increased exposure. The threat also raises compliance concerns under GDPR due to potential unauthorized access and data leakage.
Mitigation Recommendations
European organizations should immediately restrict network access to the MajorDoMo admin panel and related endpoints, ensuring they are not exposed to the public internet. Implement strict firewall rules or VPN access to limit administrative interface exposure. Apply input validation and output encoding controls at the application level to sanitize all user-supplied data before storage and rendering, particularly for the /objects/?op=set endpoint. If possible, disable or secure the unauthenticated API endpoints to prevent property enumeration and poisoning. Enforce the HttpOnly flag on session cookies to prevent client-side script access. Monitor logs for unusual activity related to property modifications or API calls. Conduct regular security assessments and penetration tests focusing on IoT management platforms. Until an official patch is available, consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting MajorDoMo endpoints. Educate administrators on the risks of accessing the admin panel from untrusted networks or devices. Finally, maintain an incident response plan tailored to IoT platform compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-18T15:22:30.053Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69962e786aea4a407ae921f9
Added to database: 2/18/2026, 9:26:16 PM
Last enriched: 2/18/2026, 9:42:48 PM
Last updated: 2/21/2026, 12:18:53 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.