IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated administrator sessions.
References
| Link | Resource |
|---|---|
| https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso | Product |
| https://www.exploit-db.com/exploits/46344 | Exploit Third Party Advisory VDB Entry |
| https://www.ipfire.org | Product |
| https://www.vulncheck.com/advisories/ipfire-core-update-stored-xss-via-extrahdcgi | Broken Link Third Party Advisory |
Configurations
History
26 Feb 2026, 15:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:* | |
| First Time |
Ipfire
Ipfire ipfire |
|
| Summary |
|
|
| References | () https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso - Product | |
| References | () https://www.exploit-db.com/exploits/46344 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.ipfire.org - Product | |
| References | () https://www.vulncheck.com/advisories/ipfire-core-update-stored-xss-via-extrahdcgi - Broken Link, Third Party Advisory |
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-26 15:06
NVD link : CVE-2019-25399
Mitre link : CVE-2019-25399
CVE.ORG link : CVE-2019-25399
JSON object : View
Products Affected
ipfire
- ipfire
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
