IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers. | |
| Title | IPFire 2.21 Core Update 127 Reflected XSS via updatexlrator.cgi | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-18T20:59:07.991Z
Updated: 2026-02-18T20:59:07.991Z
Reserved: 2026-02-18T19:14:31.673Z
Link: CVE-2019-25396
No data.
Status : Received
Published: 2026-02-18T22:16:22.620
Modified: 2026-02-18T22:16:22.620
Link: CVE-2019-25396
No data.