Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
IPFire: Malicious Scripts Can Be Injected Through Hosts.cgi
CVE-2019-25397
Summary
IPFire's hosts.cgi script is vulnerable to an attack where an attacker can inject malicious code into a user's browser, potentially allowing the attacker to steal sensitive information or take control of the user's session. This issue is particularly concerning because it allows an attacker to execute code without needing direct access to the user's device. To protect your system, update to the latest version of IPFire as soon as possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| ipfire | ipfire | 2.21 | – |
Original title
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters....
Original description
IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
nvd CVSS3.1
6.1
nvd CVSS4.0
5.1
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
- https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64... Product
- https://www.exploit-db.com/exploits/46344 Exploit Third Party Advisory VDB Entry
- https://www.ipfire.org Product
- https://www.vulncheck.com/advisories/ipfire-core-update-cross-site-scripting-via... Broken Link Third Party Advisory
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026