Description
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
Exploits (1)
References (4)
Core 4
Core References
Release Notes patch
https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via-hostsc
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46344
Various Sources product
https://www.ipfire.org
Scores
CVSS v3
6.1
EPSS
0.0008
EPSS Percentile
24.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
ipfire/ipfire
2.21 core_update127
Published
Feb 18, 2026
Tracked Since
Feb 19, 2026