Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ipfire
Ipfire ipfire |
|
| Vendors & Products |
Ipfire
Ipfire ipfire |
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPFire 2.21 Core Update 127 contains multiple reflected cross-site scripting vulnerabilities in the fwhosts.cgi script that allow attackers to inject malicious scripts through multiple parameters including HOSTNAME, IP, SUBNET, NETREMARK, HOSTREMARK, newhost, grp_name, remark, SRV_NAME, SRV_PORT, SRVGRP_NAME, SRVGRP_REMARK, and updatesrvgrp. Attackers can submit POST requests with script payloads in these parameters to execute arbitrary JavaScript in the context of authenticated users' browsers. | |
| Title | IPFire 2.21 Core Update 127 Multiple XSS via fwhosts.cgi | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-19T14:55:01.065Z
Reserved: 2026-02-18T19:21:21.542Z
Link: CVE-2019-25400
Updated: 2026-02-19T14:54:53.343Z
Status : Awaiting Analysis
Published: 2026-02-18T22:16:23.343
Modified: 2026-02-19T15:53:02.850
Link: CVE-2019-25400
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:10Z