IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.cgi script that allow attackers to inject malicious scripts through VPN configuration parameters. Attackers can submit POST requests with script payloads in parameters like VPN_IP, DMTU, ccdname, ccdsubnet, DOVPN_SUBNET, DHCP_DOMAIN, DHCP_DNS, DHCP_WINS, ROUTES_PUSH, FRAGMENT, KEEPALIVE_1, and KEEPALIVE_2 to execute arbitrary JavaScript in administrator browsers.
References
| Link | Resource |
|---|---|
| https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso | Product |
| https://www.exploit-db.com/exploits/46344 | Exploit Third Party Advisory VDB Entry |
| https://www.ipfire.org | Product |
| https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-ovpnma | Broken Link Third Party Advisory |
Configurations
History
26 Feb 2026, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso - Product | |
| References | () https://www.exploit-db.com/exploits/46344 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.ipfire.org - Product | |
| References | () https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-ovpnma - Broken Link, Third Party Advisory | |
| First Time |
Ipfire
Ipfire ipfire |
|
| CPE | cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:* | |
| Summary |
|
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-26 15:06
NVD link : CVE-2019-25398
Mitre link : CVE-2019-25398
CVE.ORG link : CVE-2019-25398
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
