Description
IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers.
Exploits (1)
References (4)
Core 4
Core References
Various Sources product
https://www.ipfire.org
Release Notes patch
https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/ipfire-core-update-reflected-xss-via-updatexlrator
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46344
Scores
CVSS v3
6.1
EPSS
0.0008
EPSS Percentile
23.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
ipfire/ipfire
2.21 core_update127
Published
Feb 18, 2026
Tracked Since
Feb 19, 2026