Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ipfire:ipfire:2.27:core_update181:*:*:*:*:*:* |
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:* |
Thu, 19 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ipfire
Ipfire ipfire |
|
| Vendors & Products |
Ipfire
Ipfire ipfire |
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers. | |
| Title | IPFire 2.21 Core Update 127 Reflected XSS via updatexlrator.cgi | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:26:38.460Z
Reserved: 2026-02-18T19:14:31.673Z
Link: CVE-2019-25396
Updated: 2026-02-19T14:39:15.700Z
Status : Analyzed
Published: 2026-02-18T22:16:22.620
Modified: 2026-02-26T15:06:06.327
Link: CVE-2019-25396
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:14Z