PT-2025-34808 · Ipfire · Ipfire

4Rdr

·

Published

2025-08-26

·

Updated

2025-08-26

·

CVE-2025-50975

CVSS v3.1
5.4
VectorAV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Name of the Vulnerable Software and Affected Versions:

IPFire version 2.29

Description:

The web-based firewall interface (firewall.cgi) fails to sanitize several rule parameters, including PROT, SRC PORT, TGT PORT, dnatport, key, ruleremark, src addr, std net tgt, and tgt addr. This allows an authenticated administrator to inject persistent JavaScript. The resulting stored cross-site scripting (XSS) payload is executed when another administrator views the firewall rules page, potentially enabling session hijacking and unauthorized actions within the interface. Exploitation requires high-privilege GUI access and is considered low complexity.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

XSS

Weakness Enumeration

Related Identifiers

CVE-2025-50975

Affected Products

Ipfire