Multiple command injection vulnerabilities have been discovered in Endian Firewall, affecting versions 3.3.25 and prior. These vulnerabilities allow authenticated attackers to execute arbitrary operating system commands. A patch is available to address these issues.
These vulnerabilities are considered high severity, with a CVSS score of 8.8.
What is Endian Firewall?
CVE-2026-34797: Endian Firewall /cgi-bin/logs_smtp.cgi DATE Command Injection
High severity: allows arbitrary command execution by authenticated users.
The DATE parameter in /cgi-bin/logs_smtp.cgi is vulnerable to command injection. An authenticated user can manipulate the DATE parameter to inject arbitrary OS commands due to insufficient validation in a Perl open() call.
How to fix CVE-2026-34797 in Endian Firewall
Patch immediately- 1.Update the endian-firewall package to the latest version.
composer update endian-firewallWorkaround: No known workaround is available. Apply the patch immediately.
NextGuard automatically flags CVE-2026-34797 if Endian Firewall appears in any of your monitored projects — no manual lookup required.
CVE-2026-34794: Endian Firewall /cgi-bin/logs_ids.cgi DATE Command Injection
High severity: allows arbitrary command execution by authenticated users.
The DATE parameter in /cgi-bin/logs_ids.cgi is vulnerable to command injection. An authenticated user can manipulate the DATE parameter to inject arbitrary OS commands due to insufficient validation in a Perl open() call.
How to fix CVE-2026-34794 in Endian Firewall
Patch immediately- 1.Update the endian-firewall package to the latest version.
composer update endian-firewallWorkaround: No known workaround is available. Apply the patch immediately.
NextGuard automatically flags CVE-2026-34794 if Endian Firewall appears in any of your monitored projects — no manual lookup required.
CVE-2026-34792: Endian Firewall /cgi-bin/logs_clamav.cgi DATE Command Injection
High severity: allows arbitrary command execution by authenticated users.
The DATE parameter in /cgi-bin/logs_clamav.cgi is vulnerable to command injection. An authenticated user can manipulate the DATE parameter to inject arbitrary OS commands due to insufficient validation in a Perl open() call.
How to fix CVE-2026-34792 in Endian Firewall
Patch immediately- 1.Update the endian-firewall package to the latest version.
composer update endian-firewallWorkaround: No known workaround is available. Apply the patch immediately.
NextGuard automatically flags CVE-2026-34792 if Endian Firewall appears in any of your monitored projects — no manual lookup required.
Stay ahead of perl vulnerabilities
Proactively detect and remediate vulnerabilities in your perl projects. Use NextGuard to monitor your perl dependencies.
Compare PlansFrequently asked questions
Multiple command injection vulnerabilities in Endian Firewall require immediate patching. Keep your systems secure by staying informed about the latest threats and updates. see all perl vulnerabilities.
Related topics