Browse all 5 CVE security advisories affecting Ipfire. AI-powered Chinese analysis, POCs, and references for each vulnerability.
IPFire serves as a Linux-based firewall and gateway solution primarily for small to medium networks, emphasizing security and ease of deployment. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from web interface components or core services. The project maintains a security-focused approach with regular updates and a modular architecture. While no major public incidents have been widely documented, the five recorded CVEs highlight potential risks in web management and networking components, underscoring the importance of timely patching for deployments exposed to untrusted networks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-25400 | IPFire 2.21 Core Update 127 Multiple XSS via fwhosts.cgi — IPFireCWE-79 | 5.4 | Medium | 2026-02-18 |
| CVE-2019-25398 | IPFire 2.21 Core Update 127 Cross-Site Scripting via ovpnmain.cgi — IPFireCWE-79 | 6.1 | Medium | 2026-02-18 |
| CVE-2019-25399 | IPFire 2.21 Core Update 127 Stored XSS via extrahd.cgi — IPFireCWE-79 | 6.4 | Medium | 2026-02-18 |
| CVE-2019-25397 | IPFire 2.21 Core Update 127 Cross-Site Scripting via hosts.cgi — IPFireCWE-79 | 6.1 | Medium | 2026-02-18 |
| CVE-2019-25396 | IPFire 2.21 Core Update 127 Reflected XSS via updatexlrator.cgi — IPFireCWE-79 | 6.1 | Medium | 2026-02-18 |
This page lists every published CVE security advisory associated with Ipfire. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.