CVE-2019-25400

MEDIUM

IPFire 2.21 Core Update 127 - XSS

Title source: llm
STIX 2.1

Description

IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated users' browsers.

Exploits (1)

exploitdb WORKING POC
by Ozer Goker · textwebappscgi
https://www.exploit-db.com/exploits/46344

References (4)

Core 4

Scores

CVSS v3 5.4
EPSS 0.0007
EPSS Percentile 20.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (1)
ipfire/ipfire 2.21 core_update127
Published Feb 18, 2026
Tracked Since Feb 19, 2026