IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
References
| Link | Resource |
|---|---|
| https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso | Product |
| https://www.exploit-db.com/exploits/46344 | Exploit Third Party Advisory VDB Entry |
| https://www.ipfire.org | Product |
| https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-hostsc | Broken Link Third Party Advisory |
Configurations
History
26 Feb 2026, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:* | |
| References | () https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso - Product | |
| References | () https://www.exploit-db.com/exploits/46344 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.ipfire.org - Product | |
| References | () https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-hostsc - Broken Link, Third Party Advisory | |
| First Time |
Ipfire
Ipfire ipfire |
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-26 15:06
NVD link : CVE-2019-25397
Mitre link : CVE-2019-25397
CVE.ORG link : CVE-2019-25397
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
