CVE-2019-25397

IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:*

History

26 Feb 2026, 15:06

Type Values Removed Values Added
Summary
  • (es) IPFire 2.21 Core Update 127 contiene múltiples vulnerabilidades de cross-site scripting reflejado en el script hosts.cgi que permiten a los atacantes inyectar scripts maliciosos a través de parámetros no validados. Los atacantes pueden enviar solicitudes POST con cargas útiles de script en los parámetros KEY1, IP, HOST o DOM para ejecutar JavaScript arbitrario en los navegadores de los usuarios.
CPE cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:*
References () https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso - () https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso - Product
References () https://www.exploit-db.com/exploits/46344 - () https://www.exploit-db.com/exploits/46344 - Exploit, Third Party Advisory, VDB Entry
References () https://www.ipfire.org - () https://www.ipfire.org - Product
References () https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-hostsc - () https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-hostsc - Broken Link, Third Party Advisory
First Time Ipfire
Ipfire ipfire

18 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 22:16

Updated : 2026-02-26 15:06


NVD link : CVE-2019-25397

Mitre link : CVE-2019-25397

CVE.ORG link : CVE-2019-25397


JSON object : View

Products Affected

ipfire

  • ipfire
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')