Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ipfire:ipfire:2.27:core_update181:*:*:*:*:*:* |
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ipfire:ipfire:2.21:core_update127:*:*:*:*:*:* |
Thu, 19 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ipfire
Ipfire ipfire |
|
| Vendors & Products |
Ipfire
Ipfire ipfire |
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated users' browsers. | |
| Title | IPFire 2.21 Core Update 127 Multiple XSS via fwhosts.cgi | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:26:41.709Z
Reserved: 2026-02-18T19:21:21.542Z
Link: CVE-2019-25400
Updated: 2026-02-19T14:54:53.343Z
Status : Analyzed
Published: 2026-02-18T22:16:23.343
Modified: 2026-02-26T15:07:02.957
Link: CVE-2019-25400
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:10Z