Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27177: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergejey MajorDoMo

0
Medium
VulnerabilityCVE-2026-27177cvecve-2026-27177
Published: Wed Feb 18 2026 (02/18/2026, 21:10:38 UTC)
Source: CVE Database V5
Vendor/Project: sergejey
Product: MajorDoMo

Description

MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability via the /objects/?op=set endpoint, which is intentionally unauthenticated for IoT device integration. User-supplied property values are stored raw in the database without sanitization. When an administrator views the property editor in the admin panel, the stored values are rendered without escaping in both a paragraph tag (SOURCE field) and a textarea element (VALUE field). The XSS fires on page load without requiring any click from the admin. Additionally, the session cookie lacks the HttpOnly flag, enabling session hijack via document.cookie exfiltration. An attacker can enumerate properties via the unauthenticated /api.php/data/ endpoint and poison any property with malicious JavaScript.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:42:48 UTC

Technical Analysis

MajorDoMo, a home automation platform designed for IoT device integration, suffers from a stored cross-site scripting (XSS) vulnerability identified as CVE-2026-27177. The vulnerability arises from the /objects/?op=set endpoint, which is intentionally left unauthenticated to facilitate IoT device integration. This endpoint accepts user-supplied property values that are stored directly in the backend database without any input sanitization or encoding. When an administrator accesses the property editor within the admin panel, these stored values are rendered directly into the HTML page inside a paragraph tag (SOURCE field) and a textarea element (VALUE field) without escaping. This unsafe rendering leads to the execution of malicious JavaScript code embedded in the property values immediately upon page load, without requiring any click or additional user interaction. Compounding the risk, the session cookie used by the admin panel lacks the HttpOnly attribute, allowing the attacker’s script to access document.cookie and exfiltrate session tokens, facilitating session hijacking. Furthermore, the attacker can enumerate existing properties through the unauthenticated /api.php/data/ endpoint and inject malicious payloads into any property, effectively poisoning the admin interface. The vulnerability has a CVSS 4.0 score of 5.3, indicating medium severity, with an attack vector over the network, no privileges or authentication required, and no user interaction needed. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it a credible threat, especially in environments where the admin panel is accessible or insufficiently protected. The lack of input validation and improper output encoding are classic web application security failures that enable this attack vector. The vulnerability affects version 0 of MajorDoMo, and no official patches or mitigations have been linked yet.

Potential Impact

For European organizations using MajorDoMo for IoT home or building automation, this vulnerability could lead to unauthorized administrative access through session hijacking, resulting in potential manipulation or disruption of IoT devices and automation workflows. Confidentiality is at risk due to session token theft, and integrity is compromised as attackers can inject malicious scripts that alter system behavior or steal sensitive data. Availability could be indirectly affected if attackers disable or misconfigure devices. Since the attack requires no authentication and can be triggered remotely, organizations with exposed or poorly segmented admin interfaces are particularly vulnerable. This risk extends to smart buildings, residential complexes, and enterprises relying on MajorDoMo for automation, potentially impacting privacy and operational continuity. The medium severity score reflects a moderate but tangible threat, especially given the unauthenticated access to the vulnerable endpoint. The lack of HttpOnly on cookies exacerbates the risk by enabling session hijacking. European organizations with lax network segmentation or insufficient access controls for IoT management interfaces face increased exposure. The threat also raises compliance concerns under GDPR due to potential unauthorized access and data leakage.

Mitigation Recommendations

European organizations should immediately restrict network access to the MajorDoMo admin panel and related endpoints, ensuring they are not exposed to the public internet. Implement strict firewall rules or VPN access to limit administrative interface exposure. Apply input validation and output encoding controls at the application level to sanitize all user-supplied data before storage and rendering, particularly for the /objects/?op=set endpoint. If possible, disable or secure the unauthenticated API endpoints to prevent property enumeration and poisoning. Enforce the HttpOnly flag on session cookies to prevent client-side script access. Monitor logs for unusual activity related to property modifications or API calls. Conduct regular security assessments and penetration tests focusing on IoT management platforms. Until an official patch is available, consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting MajorDoMo endpoints. Educate administrators on the risks of accessing the admin panel from untrusted networks or devices. Finally, maintain an incident response plan tailored to IoT platform compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-18T15:22:30.053Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962e786aea4a407ae921f9

Added to database: 2/18/2026, 9:26:16 PM

Last enriched: 2/18/2026, 9:42:48 PM

Last updated: 2/21/2026, 12:18:53 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats