IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers.
References
| Link | Resource |
|---|---|
| https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso | Product |
| https://www.exploit-db.com/exploits/46344 | Exploit Third Party Advisory VDB Entry |
| https://www.ipfire.org | Product |
| https://www.vulncheck.com/advisories/ipfire-core-update-reflected-xss-via-updatexlrator | Broken Link Third Party Advisory |
Configurations
History
26 Feb 2026, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ipfire
Ipfire ipfire |
|
| Summary |
|
|
| CPE | cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:* | |
| References | () https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso - Product | |
| References | () https://www.exploit-db.com/exploits/46344 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.ipfire.org - Product | |
| References | () https://www.vulncheck.com/advisories/ipfire-core-update-reflected-xss-via-updatexlrator - Broken Link, Third Party Advisory |
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-26 15:06
NVD link : CVE-2019-25396
Mitre link : CVE-2019-25396
CVE.ORG link : CVE-2019-25396
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
