IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated administrator sessions.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPFire 2.21 Core Update 127 contains multiple stored cross-site scripting vulnerabilities in the extrahd.cgi script that allow attackers to inject malicious scripts through the FS, PATH, and UUID parameters. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated administrator sessions. | |
| Title | IPFire 2.21 Core Update 127 Stored XSS via extrahd.cgi | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-18T20:59:10.495Z
Updated: 2026-02-18T20:59:10.495Z
Reserved: 2026-02-18T19:20:36.501Z
Link: CVE-2019-25399
No data.
Status : Received
Published: 2026-02-18T22:16:23.177
Modified: 2026-02-18T22:16:23.177
Link: CVE-2019-25399
No data.