IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
History

Wed, 18 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the hosts.cgi script that allow attackers to inject malicious scripts through unvalidated parameters. Attackers can submit POST requests with script payloads in the KEY1, IP, HOST, or DOM parameters to execute arbitrary JavaScript in users' browsers.
Title IPFire 2.21 Core Update 127 Cross-Site Scripting via hosts.cgi
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-02-18T20:59:08.864Z

Updated: 2026-02-18T20:59:08.864Z

Reserved: 2026-02-18T19:16:33.428Z

Link: CVE-2019-25397

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-18T22:16:22.833

Modified: 2026-02-18T22:16:22.833

Link: CVE-2019-25397

cve-icon Redhat

No data.