Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
IPFire 2.21 Update 127: Attackers Can Inject Malicious Browser Scripts
CVE-2019-25400
Summary
IPFire's update 127 has a security flaw that allows hackers to inject malicious code into a user's web browser if they visit a specially crafted website. This could lead to unauthorized access or data theft. To protect your network, update your IPFire system to the latest version as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| ipfire | ipfire | 2.21 | – |
Original title
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters i...
Original description
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated users' browsers.
nvd CVSS3.1
5.4
nvd CVSS4.0
4.8
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64... Product
- https://www.exploit-db.com/exploits/46344 Exploit Third Party Advisory VDB Entry
- https://www.ipfire.org Product
- https://www.vulncheck.com/advisories/ipfire-core-update-multiple-xss-via-fwhosts... Broken Link Third Party Advisory
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026