Ipfire

8 CVEs product

Monthly

CVE-2019-25400 MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. [CVSS 5.4 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVSS 3.1
5.4
EPSS
0.1%
CVE-2019-25399 MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. [CVSS 6.4 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVSS 3.1
6.4
EPSS
0.0%
CVE-2019-25398 MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.cgi script that allow attackers to inject malicious scripts through VPN configuration parameters. [CVSS 6.1 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2019-25397 MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. [CVSS 6.1 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2019-25396 MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. [CVSS 6.1 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-50975 MEDIUM POC This Month

IPFire 2.29 web-based firewall interface (firewall.cgi) fails to sanitize several rule parameters such as PROT, SRC_PORT, TGT_PORT, dnatport, key, ruleremark, src_addr, std_net_tgt, and tgt_addr,. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Ipfire
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-50976 MEDIUM POC This Month

IPFire 2.29 DNS management interface (dns.cgi) fails to properly sanitize user-supplied input in the NAMESERVER, REMARK, and TLS_HOSTNAME query parameters, resulting in a reflected cross-site. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Ipfire
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-50974 MEDIUM POC This Week

The Calamaris log exporter CGI (/cgi-bin/logs.cgi/calamaris.dat) in IPFire 2.29 does not properly sanitize user-supplied input before incorporating parameter values into a shell command. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Command Injection Ipfire
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2019-25400
EPSS 0% CVSS 5.4
MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. [CVSS 5.4 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVE-2019-25399
EPSS 0% CVSS 6.4
MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. [CVSS 6.4 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVE-2019-25398
EPSS 0% CVSS 6.1
MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.cgi script that allow attackers to inject malicious scripts through VPN configuration parameters. [CVSS 6.1 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVE-2019-25397
EPSS 0% CVSS 6.1
MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. [CVSS 6.1 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVE-2019-25396
EPSS 0% CVSS 6.1
MEDIUM POC This Month

IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. [CVSS 6.1 MEDIUM]

XSS Ipfire
NVD Exploit-DB
CVE-2025-50975
EPSS 0% CVSS 5.4
MEDIUM POC This Month

IPFire 2.29 web-based firewall interface (firewall.cgi) fails to sanitize several rule parameters such as PROT, SRC_PORT, TGT_PORT, dnatport, key, ruleremark, src_addr, std_net_tgt, and tgt_addr,. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Ipfire
NVD GitHub
CVE-2025-50976
EPSS 0% CVSS 6.1
MEDIUM POC This Month

IPFire 2.29 DNS management interface (dns.cgi) fails to properly sanitize user-supplied input in the NAMESERVER, REMARK, and TLS_HOSTNAME query parameters, resulting in a reflected cross-site. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Ipfire
NVD GitHub
CVE-2025-50974
EPSS 0% CVSS 6.5
MEDIUM POC This Week

The Calamaris log exporter CGI (/cgi-bin/logs.cgi/calamaris.dat) in IPFire 2.29 does not properly sanitize user-supplied input before incorporating parameter values into a shell command. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Command Injection Ipfire
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy