Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
IPFire VPN Configuration Parameter Cross-Site Scripting Flaw
CVE-2019-25398
Summary
IPFire VPN configuration parameters can be exploited to inject malicious scripts into administrator browsers, potentially allowing attackers to take control of the system. This affects the ovpnmain.cgi script in IPFire 2.21 Core Update 127. To protect your system, update to the latest version of IPFire.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| ipfire | ipfire | 2.21 | – |
Original title
IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.cgi script that allow attackers to inject malicious scripts through VPN configuration parameters. ...
Original description
IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.cgi script that allow attackers to inject malicious scripts through VPN configuration parameters. Attackers can submit POST requests with script payloads in parameters like VPN_IP, DMTU, ccdname, ccdsubnet, DOVPN_SUBNET, DHCP_DOMAIN, DHCP_DNS, DHCP_WINS, ROUTES_PUSH, FRAGMENT, KEEPALIVE_1, and KEEPALIVE_2 to execute arbitrary JavaScript in administrator browsers.
nvd CVSS3.1
6.1
nvd CVSS4.0
5.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64... Product
- https://www.exploit-db.com/exploits/46344 Exploit Third Party Advisory VDB Entry
- https://www.ipfire.org Product
- https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via... Broken Link Third Party Advisory
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026