Description
IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated administrator sessions.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46344
Various Sources product
https://www.ipfire.org
Release Notes patch
https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64-full-core127.iso
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/ipfire-core-update-stored-xss-via-extrahdcgi
Scores
CVSS v3
6.4
EPSS
0.0006
EPSS Percentile
17.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
ipfire/ipfire
2.21 core_update127
Published
Feb 18, 2026
Tracked Since
Feb 19, 2026