← Back to CVEs
CVE-2019-25400
MEDIUM5.4
Description
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated users' browsers.
CVE Details
CVSS v3.1 Score5.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published2/18/2026
Last Modified2/26/2026
Sourcenvd
Honeypot Sightings0
Affected Products
ipfire:ipfire
Weaknesses (CWE)
CWE-79
References
https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46344(disclosure@vulncheck.com)
https://www.ipfire.org(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/ipfire-core-update-multiple-xss-via-fwhostscgi(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.