Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27504: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in sa2blv SVXportal

0
Medium
VulnerabilityCVE-2026-27504cvecve-2026-27504cwe-79
Published: Fri Feb 20 2026 (02/20/2026, 16:48:57 UTC)
Source: CVE Database V5
Vendor/Project: sa2blv
Product: SVXportal

Description

SVXportal version 2.5 and prior contain a reflected cross-site scripting vulnerability in radiomobile_front.php via the stationid query parameter. When an authenticated administrator views a crafted URL, the application embeds the unsanitized parameter value into a hidden input value field, allowing attacker-supplied script injection and execution in the administrator's browser. This can be used to compromise admin sessions or perform unauthorized actions via the administrator's authenticated context.

AI-Powered Analysis

AILast updated: 02/20/2026, 20:44:49 UTC

Technical Analysis

CVE-2026-27504 is a reflected cross-site scripting (XSS) vulnerability classified under CWE-79, affecting SVXportal versions 2.5 and earlier. The vulnerability arises from improper neutralization of user input in the radiomobile_front.php script, specifically through the stationid query parameter. When an authenticated administrator visits a maliciously crafted URL containing a manipulated stationid parameter, the application fails to sanitize this input before embedding it into a hidden input field within the web page. This allows an attacker to inject arbitrary JavaScript code that executes in the administrator's browser context. Because the script runs with the administrator's privileges, it can hijack sessions, steal cookies, or perform unauthorized administrative actions. The vulnerability requires the administrator to click or visit the malicious link, making user interaction necessary. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and low scope impact. Although no public exploits are known, the vulnerability poses a significant risk due to the high privileges of the targeted user. No official patches or mitigations have been released by the vendor as of the publication date. This vulnerability highlights the critical importance of input validation and output encoding in web applications, especially for parameters embedded in HTML elements.

Potential Impact

The primary impact of CVE-2026-27504 is the potential compromise of administrator accounts within SVXportal deployments. Successful exploitation can lead to session hijacking, unauthorized administrative actions, and potentially full control over the affected portal. This could result in unauthorized configuration changes, data leakage, or disruption of services managed through SVXportal. Since the vulnerability targets administrators, the confidentiality, integrity, and availability of the system are at risk. Organizations relying on SVXportal for critical communications or infrastructure management could face operational disruptions and reputational damage. The requirement for user interaction (administrator clicking a malicious link) somewhat limits the attack surface but does not eliminate the risk, especially in environments where phishing or social engineering attacks are common. The absence of known exploits in the wild suggests limited current exploitation but also indicates the need for proactive defense before attackers develop weaponized payloads.

Mitigation Recommendations

To mitigate CVE-2026-27504, organizations should immediately implement the following measures: 1) Educate administrators to avoid clicking on suspicious or untrusted links, especially those containing query parameters. 2) Employ web application firewalls (WAFs) with rules designed to detect and block reflected XSS payloads targeting the stationid parameter. 3) Restrict administrative access to SVXportal interfaces to trusted networks or VPNs to reduce exposure. 4) Monitor administrator sessions for unusual activity that could indicate session hijacking or unauthorized actions. 5) If possible, apply manual input validation or output encoding in the radiomobile_front.php script to sanitize the stationid parameter, such as encoding special characters before embedding in HTML. 6) Regularly check for vendor updates or patches addressing this vulnerability and apply them promptly once available. 7) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the administrator interface. These steps go beyond generic advice by focusing on immediate risk reduction and compensating controls until a vendor patch is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-19T19:51:07.327Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998c42f2c4d84f260d040ab

Added to database: 2/20/2026, 8:29:35 PM

Last enriched: 2/20/2026, 8:44:49 PM

Last updated: 2/20/2026, 9:57:32 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats