Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27178: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergejey MajorDoMo

0
Medium
VulnerabilityCVE-2026-27178cvecve-2026-27178
Published: Wed Feb 18 2026 (02/18/2026, 21:10:39 UTC)
Source: CVE Database V5
Vendor/Project: sergejey
Product: MajorDoMo

Description

MajorDoMo (aka Major Domestic Module) contains a stored cross-site scripting (XSS) vulnerability through method parameter injection into the shoutbox. The /objects/?method= endpoint allows unauthenticated execution of stored methods with attacker-controlled parameters. Default methods such as ThisComputer.VolumeLevelChanged pass the user-supplied VALUE parameter directly into the say() function, which stores the message raw in the shouts database table without escaping. The shoutbox widget renders stored messages without sanitization in both PHP rendering code and HTML templates. Because the dashboard widget auto-refreshes every 3 seconds, the injected script executes automatically when any administrator loads the dashboard, enabling session hijack through cookie exfiltration.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:42:31 UTC

Technical Analysis

CVE-2026-27178 is a stored cross-site scripting vulnerability affecting MajorDoMo, a home automation and smart device management platform developed by sergejey. The vulnerability exists in the /objects/?method= endpoint, which allows unauthenticated users to invoke stored methods with attacker-controlled parameters. Specifically, default methods such as ThisComputer.VolumeLevelChanged accept a VALUE parameter that is passed directly into the say() function. This function stores the message in the shouts database table without any escaping or sanitization. The shoutbox widget on the dashboard renders these stored messages both in PHP rendering code and HTML templates without sanitization, leading to persistent XSS. Because the dashboard widget auto-refreshes every 3 seconds, any injected malicious script executes automatically when an administrator loads or refreshes the dashboard, without requiring any user interaction. This enables attackers to hijack administrator sessions by exfiltrating cookies or other sensitive data. The vulnerability is exploitable remotely without authentication, increasing its risk. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no privileges required, user interaction required, low impact on confidentiality and integrity, no impact on availability, and low scope and security requirements. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to administrative control and data confidentiality within affected deployments.

Potential Impact

For European organizations using MajorDoMo, this vulnerability could lead to unauthorized administrative access through session hijacking, compromising the confidentiality and integrity of automation controls and potentially sensitive data. Since the exploit requires no authentication and is triggered automatically via the dashboard's auto-refresh, attackers can silently compromise administrator sessions. This may allow attackers to manipulate home or building automation systems, disrupt operations, or gain further footholds in internal networks. The impact is particularly critical for organizations relying on MajorDoMo for managing critical infrastructure or sensitive environments. Additionally, compromised administrator accounts could be leveraged for lateral movement or data exfiltration. Although availability impact is low, the breach of administrative credentials and control could have cascading effects on operational security and privacy compliance, especially under GDPR regulations in Europe.

Mitigation Recommendations

1. Immediately restrict access to the /objects/?method= endpoint through network-level controls such as firewalls or web application firewalls (WAF) to prevent unauthenticated access. 2. Implement input validation and output encoding on all user-supplied data, especially in the shoutbox feature, to neutralize malicious scripts before storage and rendering. 3. Disable or remove the shoutbox widget from the dashboard if it is not essential to reduce attack surface. 4. Introduce Content Security Policy (CSP) headers to limit the impact of any injected scripts by restricting script sources and preventing inline script execution. 5. Monitor dashboard access logs and network traffic for unusual activity indicative of exploitation attempts. 6. Apply principle of least privilege to administrator accounts and consider multi-factor authentication to reduce risk from session hijacking. 7. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 8. Educate administrators about the risk of persistent XSS and encourage regular session invalidation and use of secure cookies with HttpOnly and Secure flags.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-18T15:22:30.053Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69962e786aea4a407ae921fe

Added to database: 2/18/2026, 9:26:16 PM

Last enriched: 2/18/2026, 9:42:31 PM

Last updated: 2/21/2026, 12:19:32 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats