← Back to CVEs
CVE-2019-25399
MEDIUM6.4
Description
IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated administrator sessions.
CVE Details
CVSS v3.1 Score6.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/18/2026
Last Modified2/26/2026
Sourcenvd
Honeypot Sightings0
Affected Products
ipfire:ipfire
Weaknesses (CWE)
CWE-79
References
https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46344(disclosure@vulncheck.com)
https://www.ipfire.org(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/ipfire-core-update-stored-xss-via-extrahdcgi(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.