IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers. | |
| Title | IPFire 2.21 Core Update 127 Cross-Site Scripting via hosts.cgi | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-18T20:59:08.864Z
Reserved: 2026-02-18T19:16:33.428Z
Link: CVE-2019-25397
No data.
Status : Received
Published: 2026-02-18T22:16:22.833
Modified: 2026-02-18T22:16:22.833
Link: CVE-2019-25397
No data.
OpenCVE Enrichment
No data.